2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 2007
DOI: 10.1109/seccom.2007.4550367
|View full text |Cite
|
Sign up to set email alerts
|

A layout-similarity-based approach for detecting phishing pages

Abstract: Phishing is a current social engineering attack that results in online identity theft. In a phishing attack, the attacker persuades the victim to reveal confidential information by using web site spoofing techniques. Typically, the captured information is then used to make an illegal economic profit by purchasing goods or undertaking online banking transactions. Although simple in nature, because of their effectiveness, phishing attacks still remain a great source of concern for organizations with online custo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 101 publications
(54 citation statements)
references
References 10 publications
0
52
0
Order By: Relevance
“…A number of approaches has been proposed by the research community to protect users from phishing attacks, which vary from user awareness surveys to experiments of the effectiveness of current security mechanisms and proposals of novel ones. More specifically, the work in Banu et al (2013), Rosiello et al (2007) and Rani and Dubey (2014) focuses on phishing with regards to its properties, characteristics, attack types, and available counter-measures. Authors in Rani and Dubey (2014), Jansson and Von Solms (2013) present a survey on user training methods, as well as their effectiveness against phishing attacks.…”
Section: Phishingmentioning
confidence: 99%
“…A number of approaches has been proposed by the research community to protect users from phishing attacks, which vary from user awareness surveys to experiments of the effectiveness of current security mechanisms and proposals of novel ones. More specifically, the work in Banu et al (2013), Rosiello et al (2007) and Rani and Dubey (2014) focuses on phishing with regards to its properties, characteristics, attack types, and available counter-measures. Authors in Rani and Dubey (2014), Jansson and Von Solms (2013) present a survey on user training methods, as well as their effectiveness against phishing attacks.…”
Section: Phishingmentioning
confidence: 99%
“…AntiPhish [19] tracks sensitive information and informs the user whenever those are given to any untrusted website. DOMAntiPhish [33] alerts the user whenever she visits a phishing site with a layout similar to a trusted website. All these solutions help in preventing that the user is deceived in trusting a site similar to a known site she used in the past, but they do not prevent against other categories of scams, such as fake pharmacies and rogue antiviruses [7,39].…”
Section: Related Workmentioning
confidence: 99%
“…Several approaches have been proposed to detect phishing sites such as analyzing page content, layout, and other anomalies [22,26,31]. In addition, studies have analyzed the modus operandi of the criminal operations behind phishing [23], and the effectiveness of phishing defenses [25].…”
Section: Related Workmentioning
confidence: 99%