2010
DOI: 10.1007/s11235-009-9247-9
|View full text |Cite
|
Sign up to set email alerts
|

Defending the weakest link: phishing websites detection by analysing user behaviours

Abstract: Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites based on analysis of users' online behavioursi.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be manipulated freely by attackers; detection based on those data can achieve high accuracy whilst being fundamentally resilient against changing deception methods.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…Semantically distinct information should be separated [14], [58]. Text should be presented in short, simple sentences, devoid of complex grammatical structures [81], [82], [83], [84]. Longer warning notifications performed poorly in user testing [85].…”
Section: Content Guidelinesmentioning
confidence: 99%
“…Semantically distinct information should be separated [14], [58]. Text should be presented in short, simple sentences, devoid of complex grammatical structures [81], [82], [83], [84]. Longer warning notifications performed poorly in user testing [85].…”
Section: Content Guidelinesmentioning
confidence: 99%
“…Of the papers that use an unbalanced dataset, several did not use the appropriate metrics [93], [104], [118], [123], [125], [136], [148], [157]. The following nine reported the Confusion Matrix [88], [93], [94], [119], [121], [122], [130], [132], [156]. One reported AUC [104], and three reported both AUC and Confusion Matrix [98], [107], [113].…”
Section: E Evaluation Metricsmentioning
confidence: 99%
“…Using unbalanced dataset is important because of the baserate fallacy challenge. While many papers [78], [98], [102], [121], [130], [156] used unbalanced datasets, papers [96], [129] addressed this issue differently. Researchers in [96] evaluated their algorithm by changing the ratio of maliciousto-benign examples (1:2, 1:5, 1:10, 1:15 and 1:20).…”
Section: F Selected Phishing Website Detection Literaturementioning
confidence: 99%
“…Moreover, Dong focused on defending the weakest link in phishing websites detection, by analyzing online user behaviours based on visited websites and the data a user submitted to those websites [13]. Taking user"s behavior into consideration is important in addressing phishing attack, but only dealing with the data users submitted to detect phishing sites is a major limitation in handling a well designed phishing websites.…”
Section: A Content-based Through Machine Learning Techniquesmentioning
confidence: 99%