2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2016
DOI: 10.1109/iemcon.2016.7746247
|View full text |Cite
|
Sign up to set email alerts
|

Real time detection of phishing websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(21 citation statements)
references
References 5 publications
0
21
0
Order By: Relevance
“…Given that we wanted to limit our scope to heuristics that could be programmed using JavaScript and would give the desired results, CyberWarner implemented the following heuristics based on our literature review of URL heuristics [61][62][63][64][65][66][67][68]:…”
Section: Security Threat/cue: Potential Phishing Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Given that we wanted to limit our scope to heuristics that could be programmed using JavaScript and would give the desired results, CyberWarner implemented the following heuristics based on our literature review of URL heuristics [61][62][63][64][65][66][67][68]:…”
Section: Security Threat/cue: Potential Phishing Attacksmentioning
confidence: 99%
“…Length of the URL URL length of more than 75 characters is considered to be suspicious. According to a study, normal length of the URL should not exceed 54 characters [61]. In order to reduce the number of possible false positives, we consider 75 characters.…”
Section: Security Threat/cue: Potential Phishing Attacksmentioning
confidence: 99%
“…In [27] a comprehensive survey and a structural understanding of malicious URL detection techniques using ML is presented. Among the most common techniques in this field are the Support Vector Machines (SVM) [28]- [32], Logistic Regression (LR) [31], [33]- [35], Naïve Bayes (NB) [34]- [37], and Decision Tree [31], [38], [39]. In [40] a set of ML models have been evaluated for classifying malicious websites given their URL as input.…”
Section: ML For Risky Websites Detectionmentioning
confidence: 99%
“…RESULTS This paper [15] focuses on detecting phishing website URLs with domain name features. Web spoofing attack categories content-based, heuristic-based and blacklist-based approaches [8] [17] are explained and the proposed model PhishChecker is developed with the help of Microsoft Visual Studio Express 2013 and C# language [15]. Dataset used from Phishtank and Yahoo directory set and obtained an accuracy of 96%.…”
Section: Literary Reviewmentioning
confidence: 99%