2013 5th International Conference on Information and Communication Technologies 2013
DOI: 10.1109/icict.2013.6732784
|View full text |Cite
|
Sign up to set email alerts
|

Which web browser work best for detecting phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…Opera browser offered the highest level of protection by blocking 94.2% of the phishing sites. Mazher et al (2013) tested the effectiveness of anti-phishing add-ons for Internet Explorer, Chrome, and Firefox, finding that Chrome outscored the other browsers. Finally, Abrams et al (2014) examined the time required for Firefox, Chrome, Opera, IE, and Safari to block a malicious site (from the creation of the malicious domain until the time it was blocked by the browsers).…”
Section: Phishingmentioning
confidence: 99%
“…Opera browser offered the highest level of protection by blocking 94.2% of the phishing sites. Mazher et al (2013) tested the effectiveness of anti-phishing add-ons for Internet Explorer, Chrome, and Firefox, finding that Chrome outscored the other browsers. Finally, Abrams et al (2014) examined the time required for Firefox, Chrome, Opera, IE, and Safari to block a malicious site (from the creation of the malicious domain until the time it was blocked by the browsers).…”
Section: Phishingmentioning
confidence: 99%
“…The battle against phishing has been continuing and the relevant current prevention and detection strategies are presented next. Generally, most browser vendors adopt two approaches against phishing: blacklist and heuristic-based [10]. In the first method, the target URL will be checked from the phishing blacklist before accessing the URL, but this static method cannot prevent phishing completely.…”
Section: Related Workmentioning
confidence: 99%
“…The mobile user is unable to know whether the accessed URL address is safe, especially if the user lacks security awareness. For example, Google Chrome provides much better security against phishing than other web browsers [10]. It shows a warning page if the accessed URL is malicious, but the Chrome browser does not provide this service on the mobile platform, as shown in Figure 2.…”
Section: Related Workmentioning
confidence: 99%
“…Hijacker can hide on the way of all routing nodes. The means of hijacking are endless and continue to retrofit, such as homepage modifying, process hooking, system boot hijacking, LSP injection, browser plug-in hijacking [1], HTTP proxy filter [2], kernel data packet hijacking [3], bootkit [4], CDN cache pollution [5].…”
Section: Introductionmentioning
confidence: 99%
“…Several typical methods of HTTP hijacking [6]: (1)Hijackers add or tamper the channel code of Ad network or website promotion. They mainly aimed at website navigation, web search engine and some major e-commerce website.…”
Section: Introductionmentioning
confidence: 99%