2015
DOI: 10.1016/j.procs.2015.06.017
|View full text |Cite
|
Sign up to set email alerts
|

PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(30 citation statements)
references
References 4 publications
0
30
0
Order By: Relevance
“…We can see that among the most relevant state-of-the-art techniques, only three [2], [30], [35] have comparable false positive rates to ours (≤ 0.001). Two of them [2], [30] do not admit client-side implementation, thus raising concerns like user privacy and delay in phish identification [5] that we previously identified.…”
Section: Related Workmentioning
confidence: 58%
See 2 more Smart Citations
“…We can see that among the most relevant state-of-the-art techniques, only three [2], [30], [35] have comparable false positive rates to ours (≤ 0.001). Two of them [2], [30] do not admit client-side implementation, thus raising concerns like user privacy and delay in phish identification [5] that we previously identified.…”
Section: Related Workmentioning
confidence: 58%
“…In a similar manner, detection techniques relying on fixed heuristics (Alexa ranking, Google pagerank, etc.) are deployed as clientside phishing protection systems [34], [35], [36] but also exhibit high rate of missclassification [34], [36] or are not able to render decisions for all webpages [35]. Furthermore, static heuristics in client-side solutions can be easily discovered by an attacker and circumvented.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The tags in the source code of the page can be used as important features for detecting phishing attacks. In the source code for the page's footnotes, there are no real and outward links and this feature leads to detecting the phishing attack [10]. Detecting attack patterns based on these links is not an easy task due to the huge volume of information and its unorganized nature, so this requires special tools.…”
Section: Phishing Attacksmentioning
confidence: 99%
“…[6]. Phishing discovery frameworks are proactive or responsive [7]. Existing phishing discovery techniques can be isolated into four classifications: URL boycott based technique, the visual similarity based technique, the URL and content component based strategy, and the outsider web search tool based technique.…”
Section: Introductionmentioning
confidence: 99%