CHI '12 Extended Abstracts on Human Factors in Computing Systems 2012
DOI: 10.1145/2212776.2223683
|View full text |Cite
|
Sign up to set email alerts
|

Using visual website similarity for phishing detection and reporting

Abstract: Phishing is a severe threat to online users, especially since attackers improve in impersonating other websites [1]. With websites looking visually the same, users are fooled more easily (see figure 1). However, the close visual similarity can also be used to counteract phishing. We present a framework that uses visual website similarity: (1) to detect possible phishing websites and (2) to create better warnings for such attacks. We report first results together with the three step process planned for the proj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Web browsers or AddOns can check the URL against various blacklists or check the web site content in combination with the actual URL. A number of different approaches for these checks have been proposed [28,4,29,32]. In both pre-and post-click checks a risky situation can either lead to blocking or a warning e.g., [25,30,45,43].…”
Section: Related Workmentioning
confidence: 99%
“…Web browsers or AddOns can check the URL against various blacklists or check the web site content in combination with the actual URL. A number of different approaches for these checks have been proposed [28,4,29,32]. In both pre-and post-click checks a risky situation can either lead to blocking or a warning e.g., [25,30,45,43].…”
Section: Related Workmentioning
confidence: 99%
“…Web browsers or Add-ons can check the URL against various blacklists or check the web site content in combination with the actual URL. A number of different approaches for these checks have been proposed [27,3,28,31]. In both pre-and post-click checks a risky situation can either lead to blocking or a warning e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Maurer and Herzner [15] detects phishing based on the comparisons of color and texture histograms of both suspicious and target site. Wu et al [16] divide the webpage into "blocks" based on its layout and identifier features from the blocks.…”
Section: B Website Phishing Detectionmentioning
confidence: 99%