2019
DOI: 10.1186/s13638-019-1361-0
|View full text |Cite
|
Sign up to set email alerts
|

Phishing page detection via learning classifiers from page layout feature

Abstract: The web technology has become the cornerstone of a wide range of platforms, such as mobile services and smart Internet-of-things (IoT) systems. In such platforms, users' data are aggregated to a cloud-based platform, where web applications are used as a key interface to access and configure user data. Securing the web interface requires solutions to deal with threats from both technical vulnerabilities and social factors. Phishing attacks are one of the most commonly exploited vectors in social engineering att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 24 publications
0
17
0
Order By: Relevance
“…They had combined their classifiers to acquire the maximum accuracy which they got from a DT. Authors in Mao et al [ 45 ] used different machine learning classifiers that include SVM, DT, AdaBoost, and RF to predict the phishing attack. Authors in Sahingoz et al [ 54 ] created their dataset.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…They had combined their classifiers to acquire the maximum accuracy which they got from a DT. Authors in Mao et al [ 45 ] used different machine learning classifiers that include SVM, DT, AdaBoost, and RF to predict the phishing attack. Authors in Sahingoz et al [ 54 ] created their dataset.…”
Section: Literature Surveymentioning
confidence: 99%
“…They used other classifiers as well but their result on RF was better than other classifiers. Similarly, authors in Mao et al [ 45 ] collected the dataset of 49 phishing websites from PhishinTank.com . They used four learning classifiers to detect phishing attacks and concluded that the RF classifiers are much better than others.…”
Section: Literature Surveymentioning
confidence: 99%
“…Mao et al. [142] and Yi et al [143] mentioned a web-based phishing problems for mobile and IoT systems where attackers are prone to access authorized users sensitive information using fake websites link. Wu et al [144] analyzed the effect of phishing attack between smart bulb mobile application and Nest server which launched to steal PIN code of the user.…”
Section: E Application Layer Threatsmentioning
confidence: 99%
“…As a new type of IBE proposed by [13], attribute-based encryption (ABE) plays a great role in access control, which is classified into the key-policy attribute-based encryption (KP-ABE) and the ciphertext-policy attributebased encryption (CP-ABE). KP-ABE associates user's private keys with the designated policies and tags ciphertexts with attributes, while CP-ABE is related to ciphertexts with the designated policies and identifies the user's private key with attributes [14,15]. Obviously, CP-ABE is a better choice to execute access control in our model since it is the user's ability to designate an access structure and process the encryption operation under the structure.…”
Section: Introductionmentioning
confidence: 99%