Proceedings of the 16th International Conference on World Wide Web 2007
DOI: 10.1145/1242572.1242660
|View full text |Cite
|
Sign up to set email alerts
|

Learning to detect phishing emails

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Keywords: phishing, email, filtering, semantic attacks, learning AbstractThere are an increasing number of emails purporting to be from a trusted entity that attempt to deceive users into providing account or identity information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
203
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 400 publications
(204 citation statements)
references
References 7 publications
1
203
0
Order By: Relevance
“…Most research about protecting users from phishing emails is about methods to check manually or automatically for keywords, grammatical inconsistencies, typos, or information misplacement [8][9][10]. All these methods can help the user, but they have not yet changed the fact that people are still falling for phishing emails [10].…”
Section: Motivationmentioning
confidence: 99%
“…Most research about protecting users from phishing emails is about methods to check manually or automatically for keywords, grammatical inconsistencies, typos, or information misplacement [8][9][10]. All these methods can help the user, but they have not yet changed the fact that people are still falling for phishing emails [10].…”
Section: Motivationmentioning
confidence: 99%
“…It is often easier for attackers to exploit human and social weaknesses of the defences than to defeat the technological countermeasures [18]. This is also evident in anti-phishing literature as most research focused on technical solutions such as: developing browser toolbars/plug-ins [23] preventative measures, characteristics and email structure [6], [20], [22], algorithms for detecting, identifying and measuring phishing emails and sites [8], [11], [32] and evaluating the effectiveness of web browser toolbar warnings/indicators [4], [7], [12], [31]. Many employees cannot identify the difference between a genuine and a spoofed website [4], [21].…”
Section: The Need For a Holistic Anti-phishing Frameworkmentioning
confidence: 99%
“…PFILTER, which was proposed by Fette et al [8], employed SVM to distinguish phishing emails from other emails. According to [9], Abu-Nimeh et al compared the predictive accuracy of several machine learning methods including LR, CART, RF, NB, SVM, and BART.…”
Section: Related Workmentioning
confidence: 99%