2009 IEEE Symposium on Computational Intelligence in Cyber Security 2009
DOI: 10.1109/cicybs.2009.4925087
|View full text |Cite
|
Sign up to set email alerts
|

Visual similarity-based phishing detection without victim site information

Abstract: Phishing attacks, which steal users' account information by fake websites, have become a serious problem on the Internet. There are two major approaches in phishing detection: the blacklist-and the heuristics-based approach. Heuristicsbased approaches employ common characteristics of phishing sites such as distinctive keywords used in web pages or URLs in order to detect new phishing sites that are not yet listed in blacklists. However, these kinds of heuristics can be easily circumvented by phishers once thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(36 citation statements)
references
References 7 publications
0
36
0
Order By: Relevance
“…Previous solutions involve clustering according to colors, fonts, and layout [27] to identify phishing sites visually similar to trusted sites. Hara et al [15] show that, given a large enough dataset of phishing sites, it is possible to automatically infer the site they are mimicking. These solutions are effective as long as the phishing attack is trying to mimic the aspect of a trusted website, but they do not cover other scam categories, such as fake pharmacies, dubious online retailers, or rogue antiviruses.…”
Section: Related Workmentioning
confidence: 99%
“…Previous solutions involve clustering according to colors, fonts, and layout [27] to identify phishing sites visually similar to trusted sites. Hara et al [15] show that, given a large enough dataset of phishing sites, it is possible to automatically infer the site they are mimicking. These solutions are effective as long as the phishing attack is trying to mimic the aspect of a trusted website, but they do not cover other scam categories, such as fake pharmacies, dubious online retailers, or rogue antiviruses.…”
Section: Related Workmentioning
confidence: 99%
“…To make the fast accessing system, I have defined the study points for the best possible solution. The studied criteria for the phishing have collected from the previous study [26,27,28]. Following are the study points of phishing criteria and the reason for taking these study points are discussed herewith.…”
Section: Research Criteria Of Url Content and Image Matchingmentioning
confidence: 99%
“…Using this approach the researchers are able to classify fragments of a file, or embedded files to determine a file type; thus providing a key mitigation mechanism for common file masquerading attacks. Research conducted in [Hara et al 2009] shows how using simple methods to determine integrity, by checking and comparing visual similarity-bsaed phishing can provide accurate and effective results. The researchers demonstrate that by analysing the similarity between visual components in a website, without prior knowledge that it is an attack platform, they are able to automatically determine specific templating of websites that have been spoofed by a large degree of phishes sites.…”
Section: Technicalmentioning
confidence: 99%