2011
DOI: 10.1016/j.dss.2010.08.020
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the severity of phishing attacks: A hybrid data mining approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0
4

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(28 citation statements)
references
References 25 publications
0
24
0
4
Order By: Relevance
“…Chen et al [12] have proposed a hybrid approach that mixes extraction of key phrase, textual, financial data to ascertain the vicious of phishing attack using supervised classification strategies. Nishanth et al [13] have proposed a method in which the structured style of the financial data are mined using machine learning algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [12] have proposed a hybrid approach that mixes extraction of key phrase, textual, financial data to ascertain the vicious of phishing attack using supervised classification strategies. Nishanth et al [13] have proposed a method in which the structured style of the financial data are mined using machine learning algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…A new phishing webpage detection approach proposed by Zhao et al [3] based on a kind of semi-supervised learning method-transductive support vector machine (TSVM). The features of web image are extracted for complementing the disadvantage of phishing detection only based on document object model (DOM); includes gray histogram, color histogram, and spatial relationship between sub graphs.…”
Section: A Semi-supervised Learning Approach For Detection Of Phishinmentioning
confidence: 99%
“…In contrast to the drawback of support vector machine (SVM) algorithm which simply trains classifier by learning little and poor representative labeled samples, this method introduces the TSVM to train classifier that it takes into account the distribution information implicitly embodied in the large quantity of the unlabeled samples, and have better performance than SVM. Zhao et al [3] extracted the features of web page image in addition to that the disadvantage of detection based on DOM objects and properties are complemented. The features include web image, DOM objects that reflect the characteristics of web pages absolutely.…”
Section: A Semi-supervised Learning Approach For Detection Of Phishinmentioning
confidence: 99%
“…Using either MLP, PNN or DT, the achieved accuracy was above 80 %. Chen et al [16] classified not only the risk levels of phishing attacks but also its impact to market value of the attacked firms, by using TM and data mining in phishing alerts and firms' financial data and they also distinguished variables with significant impact in the seriousness of the attacks. Finally, Wang et al [17] conducted both quantitative and qualitative analysis in order to measure the financial impact of the information security incidents reported in firm financial reports.…”
Section: Related Workmentioning
confidence: 99%