2022
DOI: 10.1109/msec.2021.3129992
|View full text |Cite
|
Sign up to set email alerts
|

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…All of them suggested a significantly faster blacklist response time for protecting users more effectively. In addition, cybercriminals continue to use evasion techniques to make phishing websites remain online so that it is accessible to victim users for a long time [28,29,47]. These studies imply that, as far as the standard anti-phishing defense is operated in a reactive manner, phishing attacks will still remain a significant threat to Internet users.…”
Section: B Limitations Of Current Anti-phishing Systemsmentioning
confidence: 99%
“…All of them suggested a significantly faster blacklist response time for protecting users more effectively. In addition, cybercriminals continue to use evasion techniques to make phishing websites remain online so that it is accessible to victim users for a long time [28,29,47]. These studies imply that, as far as the standard anti-phishing defense is operated in a reactive manner, phishing attacks will still remain a significant threat to Internet users.…”
Section: B Limitations Of Current Anti-phishing Systemsmentioning
confidence: 99%
“…Attackers create wellcrafted phishing websites with a look and feel of the legitimate sites they are trying to impersonate, thus making it very challenging for individuals to identify phishing sites. In addition, to avoid being detected, attackers have refined over the years their tactics and evasion techniques, as demonstrated in [1].…”
Section: Introductionmentioning
confidence: 99%
“…However, each of these sources is either slow to update or has a low coverage of malicious URLs [1,12,23]. On the other hand, heuristic-based approaches, such as identifying input forms in a malicious URL to label it as phishing, tend to have both high false positives and false negatives as attackers increasingly adopt cloaking techniques to evade detection [24]. In light of this need, recent research utilized attack types labeled by individual VT scanners and the majority voting approach is employed to consider noises in VT reports [17].…”
Section: Introductionmentioning
confidence: 99%