2021
DOI: 10.3390/app11209733
|View full text |Cite
|
Sign up to set email alerts
|

HinPhish: An Effective Phishing Detection Approach Based on Heterogeneous Information Networks

Abstract: Internet users have suffered from phishing attacks for a long time. Attackers deceive users through malicious constructed phishing websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent years, many phishing detection solutions have been proposed, which mainly leverage whitelists or blacklists, website content, or side channel-based techniques. However, with the continuous improvement of phishing technology, current methods have difficulty in achieving… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 41 publications
(48 reference statements)
0
2
0
Order By: Relevance
“…In this paper, Guo and Zhang proposed an effective phishing website detection approach called as HinPhish. 13 A heterogeneous network is constructed using relationships from webpages. This approach calculated the phish-score of the target domain on the webpage.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper, Guo and Zhang proposed an effective phishing website detection approach called as HinPhish. 13 A heterogeneous network is constructed using relationships from webpages. This approach calculated the phish-score of the target domain on the webpage.…”
Section: Literature Surveymentioning
confidence: 99%
“…Some researchers have tried to identify phishing attacks by extracting different hyperlink relationships from webpages. Guo et al 28 proposed a phishing webpages detection approach which they called HinPhish. The approach establishes a heterogeneous information network (HIN) based on domain nodes and loading resources nodes and establishes three relationships between the four hyperlinks: external link, empty link, internal link and relative link.…”
Section: Related Workmentioning
confidence: 99%