2014
DOI: 10.1109/tnsm.2014.2377295
|View full text |Cite
|
Sign up to set email alerts
|

PhishStorm: Detecting Phishing With Streaming Analytics

Abstract: Abstract-Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishStorm, an automated phishing detection system that can analyse in real-time any URL in order to identify potenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
71
0
3

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 168 publications
(74 citation statements)
references
References 38 publications
0
71
0
3
Order By: Relevance
“…[38] of a webpage provides relevant information to identify phishs. Some detection methods rely on URL lexical obfuscation characteristics [12], [33] and webpage hosting related features [30], [39] to decide if a webpage is a phish. The visual similarity of a phish with its target was also exploited to detect phishs [31], [40].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[38] of a webpage provides relevant information to identify phishs. Some detection methods rely on URL lexical obfuscation characteristics [12], [33] and webpage hosting related features [30], [39] to decide if a webpage is a phish. The visual similarity of a phish with its target was also exploited to detect phishs [31], [40].…”
Section: Related Workmentioning
confidence: 99%
“…Other methods focused, as we do, on the study of terms that compose the data sources of a webpage [12], [33] and admit client-side implementation. Cantina [27], [32] was among the first systems to propose a lexical analysis of terms that comprise a webpage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although, the work is not related to security technique, but it presents a tightly coupled topology for deployment of BigData, where any security algorithm are easier and involves lesser computational resources. Marchal et al [25] have emphasized their investigations towards securing phishing URLs during analyzing big data [25].…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Figure 7 shows scheme of Marchal et al [25], which performs extraction of embedded links from the email (incoming) over internet. A computation of feature is performed using spidering mechanism and performs forecasting of vulnerability based using machine learning.…”
Section: Fig 7: Scheme Discussed By Marchal Et Al [25]mentioning
confidence: 99%