2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) 2019
DOI: 10.1109/icoei.2019.8862697
|View full text |Cite
|
Sign up to set email alerts
|

Variants of phishing attacks and their detection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…This is because of the large difference in data distribution between the variant and known attacks, and therefore, it is difficult for detection models trained on known attack samples to detect variant attacks. The problem of variant attacks [7], [8] in other areas has exposed gaps in commonly used detection models, and it poses a serious risk to information security. In industrial control, the Flame virus is a variant of the Stuxnet virus.…”
Section: Fig 1 Distribution Of Original Data Features Of Known and Va...mentioning
confidence: 99%
“…This is because of the large difference in data distribution between the variant and known attacks, and therefore, it is difficult for detection models trained on known attack samples to detect variant attacks. The problem of variant attacks [7], [8] in other areas has exposed gaps in commonly used detection models, and it poses a serious risk to information security. In industrial control, the Flame virus is a variant of the Stuxnet virus.…”
Section: Fig 1 Distribution Of Original Data Features Of Known and Va...mentioning
confidence: 99%
“…There are different features of a website which will help in finding the authenticity of a website such as content-based [17], visual-based [18], URL-based [19] and so on. Here, we will use URL-based features to determine the novelty of a website.…”
Section: Feature Extractionmentioning
confidence: 99%
“…These are also known as traditional approaches or database-oriented approaches. Their response time and detection accuracy is very high [36][42].…”
Section: List Basedmentioning
confidence: 99%
“…But there are many websites which doesn't have much content then this detection strategy fails . Now-a-days website contents are replaced by images [36].…”
Section: Content-basedmentioning
confidence: 99%