2016
DOI: 10.1016/j.eswa.2016.01.028
|View full text |Cite
|
Sign up to set email alerts
|

New rule-based phishing detection method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
84
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 208 publications
(87 citation statements)
references
References 16 publications
0
84
0
3
Order By: Relevance
“…Furthermore, studies demonstrate that in many cases users do not have proper knowledge about the SSL padlock shown in the browser . Some former methods such as in the works of Moghimi and Varjani and Gouda et al are based on using SSL. Our proposed approach is not dependent on HTTPS protocol and can be used for the websites with both HTTP and HTTPS protocols. Search engines independency: Some previously proposed anti‐phishing methods such as in other works are based on using search engine results.…”
Section: Analysis Of the Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, studies demonstrate that in many cases users do not have proper knowledge about the SSL padlock shown in the browser . Some former methods such as in the works of Moghimi and Varjani and Gouda et al are based on using SSL. Our proposed approach is not dependent on HTTPS protocol and can be used for the websites with both HTTP and HTTPS protocols. Search engines independency: Some previously proposed anti‐phishing methods such as in other works are based on using search engine results.…”
Section: Analysis Of the Proposed Methodsmentioning
confidence: 99%
“…Although this method does not falsely detect new and low profile websites as phishing, the computation power to extract and compare textual information is enormous.Fuzzy logic and neural network have been also used to detect phishing websites by employing the features extracted from the page content in the works of Aburrous et al and Nguyen et al, but both have high computational cost and can not detect all phishing attacks. PhishDetector is another detection method which used Levenshtein distance, the string matching algorithm, to evaluate the URL identity by comparing the Levenshtein distance of resource elements addresses with the website URL. This method also used the number of links, images, scripts, or CSS styles loaded through a SSL protocol and applied support vector machine (SVM) to categorize the websites in order to identify it as a phishing website or a genuine website.…”
Section: Introductionmentioning
confidence: 99%
“…Moghimi et al [53] proposed the use of Levenshtein Distance for string matching to find the relationship between the content and the URL of a webpage and used SVM for classification. Singh et al [54] proposed training via Adaline network as more efficient and accurate for neural network for phishing detection.…”
Section: Heuristics and Machine Learning-based Techniquesmentioning
confidence: 99%
“…In this attack, attackers divert Internet traffic from the legitimate website to the phishing website. Language dependent: Most of the anti-phishing techniques are based on heuristics, which include the keyword frequently appearing in the phishing website [13,14]. If these techniques detect the keywords written in the English language, then they cannot detect other languages, e.g., Chinese, Hindi, Japanese, etc.…”
Section: Phishing Attack Classificationmentioning
confidence: 99%
“…In general, phishing detection techniques can be classified as either user education or software-based anti-phishing techniques. Software-based techniques can be further classified as list-based, heuristic-based [13][14][15], and visual similarity-based techniques [16].…”
Section: Related Workmentioning
confidence: 99%