Proceedings of the 2016 ACM on International Workshop on Security and Privacy Analytics 2016
DOI: 10.1145/2875475.2875478
|View full text |Cite
|
Sign up to set email alerts
|

Countering Phishing from Brands' Vantage Point

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
4
0
2
Order By: Relevance
“…We studied a wide range of previous efforts by focusing on machine learning techniques. Some of the techniques solely focused on the URL itself [11,13] but others look at both URL and the content of the page [7,25]. The use of third-party services is another difference between approaches.…”
Section: Comparing the Results With Previous Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…We studied a wide range of previous efforts by focusing on machine learning techniques. Some of the techniques solely focused on the URL itself [11,13] but others look at both URL and the content of the page [7,25]. The use of third-party services is another difference between approaches.…”
Section: Comparing the Results With Previous Experimentsmentioning
confidence: 99%
“…Third-party enquiries to fetch the feature value reveal the browsing history of the end-users The previous studies have been done on variable sizes of datasets. While some of the datasets have less than 5 thousand records [7,25], there are also datasets with millions of instances [5,13]. Also, for approaches analyzing just the URL without the webpage content, creating massive datasets are easier.…”
Section: Comparing the Results With Previous Experimentsmentioning
confidence: 99%
“…Esto ocasionó que las antiguas técnicas de detección de phishing no funcionen contra los ataques más recientes (Bulakh, 2016, p. 1). Como consecuencia de esta amenaza evolutiva, se ha decidido usar técnicas de machine learning que permitan encontrar nuevas páginas fraudulentas en un periodo de tiempo largo o indefinido (Hota, 2018;Medvet, 2008;Chen, 2010;Bulakh, 2016;Rajab, 2018).…”
Section: Estado Del Arteunclassified
“…Lamentablemente, los métodos propuestos no son capaces de detectar nuevas variantes de estos ataques, debido a que las métricas más importantes para detectar páginas phishing derivan de experiencias humanas (Mao, Bian, Tian, Zhhu, Wei, Li y Liang, 2018, p. 2). Por dicho motivo, en la actualidad se recurre a la inteligencia artificial para poder identificar páginas phishing de manera dinámica y automática utilizando para ello diferentes métricas (Abu-Nimeh, 2007;Al-Janabi, 2017;Bulakh, 2016;Chen, 2010;Hota, 2018;Jain, 2016;Mao, 2018;Medvet, 2008;Mourtaji, 2017;Rajab, 2018;Sanglerdsinlapachai, 2010).…”
Section: Introductionunclassified
“…Li et al 2016 Machine learning approach The study proposes a minimum enclosing Ball Support Vector Machine (BSVM) algorithm for detecting phishing websites The proposed algorithm achieved an enhanced predictive performance and speed of computation in comparison to other classifiers 45. Bulakh and Gupta, 2016 Machine learning approach The study analyzes traffic portion of a brand to identify the presence of phishing threats based on machine learning classifier Experimentations showed that that random forest classifier performed exceptionally better with an error rate of 3% The phishing data set includes 10,068 samples which can be termed as a hefty data sample when compared to any data set of merely 1,000 odd instances. For such sample sizes, the ratio of data split may not always be uniformly distributed.…”
Section: Technologymentioning
confidence: 99%