2012
DOI: 10.1186/1687-417x-2012-1
|View full text |Cite
|
Sign up to set email alerts
|

phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training

Abstract: Identity theft is one of the most profitable crimes committed by felons. In the cyber space, this is commonly achieved using phishing. We propose here robust server side methodology to detect phishing attacks, called phishGILLNET, which incorporates the power of natural language processing and machine learning techniques. phishGILLNET is a multi-layered approach to detect phishing attacks. The first layer (phishGILLNET1) employs Probabilistic Latent Semantic Analysis (PLSA) to build a topic model. The topic mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 59 publications
(36 citation statements)
references
References 35 publications
0
36
0
Order By: Relevance
“…These concepts are then compared with templates learned from known phishing pages through a machine learning algorithm to determine if the Web page is a phishing one. Approximately the same technique is used in [41] to block phishing emails based on semantic content analysis. The common aspect with our approach is the leveraging of semantic information for phishing detection, a concept close to word relatedness.…”
Section: Related Workmentioning
confidence: 99%
“…These concepts are then compared with templates learned from known phishing pages through a machine learning algorithm to determine if the Web page is a phishing one. Approximately the same technique is used in [41] to block phishing emails based on semantic content analysis. The common aspect with our approach is the leveraging of semantic information for phishing detection, a concept close to word relatedness.…”
Section: Related Workmentioning
confidence: 99%
“…The attacker then performs fraudulent transaction from the user's account using this collected information. [4], network and content based filtering [22], firewalls [4,21,22], client side tool bars [4,21,22], Server Side filters [21,22] and user awareness [22]. But the most critical issue with these current techniques is, when classifying email (text), often the data contained in emails are very complex, multidimensional, or represented by a large number of features.…”
Section: Introductionmentioning
confidence: 99%
“…This Twitter scam is in full swing, using tempting messages like ''Just saw this photo of you'' followed by a link that, when you click it, takes you to a site that uploads malware (Villeneuve, 2010) onto your computer. Sometimes, by exploiting the phishing techniques (Nishanth, Ravi, Ankaiah, & Bose, 2012;Ramanathan & Wechsler, 2012), the message may seem to come from one of your regular followers, perhaps even a friend or relative. In fact, their Twitter account has been hijacked.…”
Section: Introductionmentioning
confidence: 99%