Proceedings of the Internet Measurement Conference 2018 2018
DOI: 10.1145/3278532.3278569
|View full text |Cite
|
Sign up to set email alerts
|

Needle in a Haystack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 85 publications
(22 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Such solutions process and analyze all incoming email messages and, based on rules or ML, classify them as either phishing or legitimate. ML filtering techniques have become state of the art and the classification of phishing website (e.g., [34][35][36][37][38]) can be used for blacklists. Such approaches can prevent a phishing message from reaching the target user, but attackers can use ML techniques as well (e.g., [39]) for bypassing such AI detection systems.…”
Section: Phishing Countermeasuresmentioning
confidence: 99%
“…Such solutions process and analyze all incoming email messages and, based on rules or ML, classify them as either phishing or legitimate. ML filtering techniques have become state of the art and the classification of phishing website (e.g., [34][35][36][37][38]) can be used for blacklists. Such approaches can prevent a phishing message from reaching the target user, but attackers can use ML techniques as well (e.g., [39]) for bypassing such AI detection systems.…”
Section: Phishing Countermeasuresmentioning
confidence: 99%
“…VirusTotal reports malware detections on 5 domains, but only by at most 3 out of 67 engines; these detections appear to be based on outdated information. However, Tian et al [66] have found that over 90% of phishing sites served through squatting domains could evade blacklisting, meaning that phishing may already be much more prevalent on our candidate IDNs. Finally, parked domains are known to only sometimes redirect to malicious content [68]: we manually saw instances of such intermittent redirects to blacklisted sites for several IDNs.…”
Section: Securitymentioning
confidence: 97%
“…Moreover, they generated 42 434 additional IDNs with sufficient visual similarity that are still unregistered. Tian et al [66] searched for phishing sites that impersonate a set of 702 popular brands both in content and in domain, a.o. through homograph domains.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Malicious Domain Names and Websites. Much research has been conducted on ways to observe the registration and early activity of malicious domain names [10,12,20]. Hao et al [10] unveiled that DNS infrastructures and early DNS lookup patterns for a newly registered malicious domain name differ significantly from those with a legitimate domain name.…”
Section: Related Workmentioning
confidence: 99%