2013 International Conference on IT Convergence and Security (ICITCS) 2013
DOI: 10.1109/icitcs.2013.6717870
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Detection via Identification of Website Identity

Abstract: In this paper, we propose an anti-phishing method to protect Internet users from the phishing attacks. The scope of our study is on the Internet phishing, particularly focusing on the detection of phishing website. In order to do that, our proposed method will render a screenshot of the webpage and segment the region of interest, which consists of the website logo. Next, we will utilize Google image database to identify the website identity based on the segmented website logo. During the identification process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…Similarly, extracting the logo from a webpage screenshot and using it in Google Image Search leads to identify the target of 87.0% of phishs in [41]. HREF links have been used to build community graphs of webpages.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, extracting the logo from a webpage screenshot and using it in Google Image Search leads to identify the target of 87.0% of phishs in [41]. HREF links have been used to build community graphs of webpages.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we propose a method that belongs to the heuristic-based approach, and it is an extension of our work proposed in Chang et al (2013). We claim that in order to detect a phishing website, we must first be able to determine the consistency of the website identity.…”
Section: Introductionmentioning
confidence: 96%
“…As we all know, the relationship between a logo and the domain name of a website is exclusive; any mismatch is an indication of a phishing attack. In Chang et al (2013), we had illustrated and proved that it is possible to identify the associated legitimate website from querying the logo image through a Google image search. We applied fixed segmentation with manual best-fit cropping to extract the logo.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…In this method, the submission of forms with random inputs and the corresponding responses are captured to decide whether a website is genuine or bogus. This method can detect XSS‐based attacks that many similar tools fail to recognize.Chang et al have employed Google's reverse image search, which is a service from Google to use a picture as a search item and find related images around the web or find the websites that contain that image. In this method, a screenshot of the website is taken and the logo is extracted and uploaded in Google's reverse image search service to get the keywords associated with the the logo.…”
Section: Introductionmentioning
confidence: 99%