GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254506
|View full text |Cite
|
Sign up to set email alerts
|

Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…A phishing website detection method has been proposed by Haruta et al., 9 and they combined visual similarity from the website CSS and website image. For the image-based similarity, wavelet decomposition was first applied to extract a descriptor, and minHash method is used to calculate the similarity score.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A phishing website detection method has been proposed by Haruta et al., 9 and they combined visual similarity from the website CSS and website image. For the image-based similarity, wavelet decomposition was first applied to extract a descriptor, and minHash method is used to calculate the similarity score.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Haruta et al [10] proposed the use of an image similarity analysis for phishing detection. Their method combines an image similarity analysis and the CSS format to identify legitimate websites and phishing websites.…”
Section: Visual Similarity Analysismentioning
confidence: 99%
“…In this study, we collected 24471 phishing sites from PhishTank in the collection model, with 3850 legitimate sites retrieved from the target column of the corresponding is ip address f 16 script block rate f 3 dots f 17 style block rate f 4 is special words f 18 get title feature f 5 url linkin num f 19 is login form f 6 url traffic rank f 20 is with whois f 7 get kbytes f 21 get time f 8 is frame f 22 is redirect f 9 is meta redirect f 23 ipv4 numbers f 10 is meta base64 redirect f 24 ipv6 numbers f 11 same extern domain script rate f 25 organization f 12 same external domain link rate f 26 is alias f 13 same external domain img rate f 27 is weird serial f 14 external a tag same domain f 28 get day age phishing sites. Basically, the number of phishing sites was considerably larger than the number of legitimate sites, because hackers usually imitate a specific legitimate site and design multiple similar phishing sites.…”
Section: Training Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional phishing scams detection methods cannot be well adapted to the Ethereum scenario. As Figure 1 shows, traditional phishing scams rely on building forged platforms (websites or software) to collect sensitive information or receive remittances from victims, so traditional methods focus on mining forged platform patterns, such as CSS styles [13], website URLs [23], etc. However, in Ethereum, phishing organizations take high-reward propaganda to induce remittances[6], they can swindle money directly without forged platforms by spreading phishing addresses to victims in any way such as emails, chat groups, etc.…”
Section: Introductionmentioning
confidence: 99%