2011
DOI: 10.1016/j.eswa.2011.01.046
|View full text |Cite
|
Sign up to set email alerts
|

An efficient phishing webpage detector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(40 citation statements)
references
References 4 publications
0
39
0
Order By: Relevance
“…-IP address ( f 1 ): almost all the literatures [8], [21], [23]- [25] [24], [25] followed and used this rule to define the value of this feature. However, this rule was highly affected by the samples.…”
Section: Feature Vectormentioning
confidence: 99%
See 2 more Smart Citations
“…-IP address ( f 1 ): almost all the literatures [8], [21], [23]- [25] [24], [25] followed and used this rule to define the value of this feature. However, this rule was highly affected by the samples.…”
Section: Feature Vectormentioning
confidence: 99%
“…In this research, we list 16 frequently used features in literatures [8], [21], [23]- [25] and one new feature, and make use of them to perform feature engineering.…”
Section: Feature Vectormentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, PhishNet [6], Believes that phishers often through simple URL changes, to avoid comparison, first use heuristics of known phishing sites to find new phishing websites, then apply approximate matching algorithm to generate one final score, if the score is greater than threshold, the website will be consider a potential phishing site Heuristics approach, through the analysis of the site URL and html source code to obtain the relevant features, and with others machine learning methods to determine whether the current page is a phishing site. there is study analyzed 12 features based on based on its content, HTTP transaction, and search engine results [7], and then input to support vector machine classifier, determines whether the webpage is phishing or not. In CANTINA [8], it is a content-based approach to detect phishing, besides the URL and its domain name basically, CANTINA use TF-IDF algorithm to retrieve information, TF-IDF can measure how important a word in a document, and from their experiments result, it is good at detecting phishing, and using TF-IDF can reduce FP rate effectively.…”
Section: Related Workmentioning
confidence: 99%
“…These techniques employ the DOM after a webpage has been rendered in a web browser to circumvent intended obfuscations. He, et al (2011) implemented a method used by Pan and Ding (2006) and Zhang et al (2007), using a combination of search engine results to determine whether a webpage is a phishing or not. The fundamental idea is that every website claims a dependable identity, and its activities match to that identity.…”
Section: Cantina Work As Followmentioning
confidence: 99%