2017
DOI: 10.1109/access.2017.2743528
|View full text |Cite
|
Sign up to set email alerts
|

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(42 citation statements)
references
References 34 publications
0
42
0
Order By: Relevance
“…2 The similarity distribution of facebook's legitimate and phishing websites in the scheme [7] For example, although authors in [7] focus on the positions of colors appeared in website's screenshot, it is easy for attackers to create same colored different appearance phishing websites. Moreover, although authors in [9] use CSS similarity between a targeted legitimate website and a phishing website, attackers can create a similar phishing website without using CSS by embedding legitimate website's appearance to the background image. From this point of view, another requirement has to be fulfilled to improve detection performance:…”
Section: Problem Formulationsmentioning
confidence: 99%
See 3 more Smart Citations
“…2 The similarity distribution of facebook's legitimate and phishing websites in the scheme [7] For example, although authors in [7] focus on the positions of colors appeared in website's screenshot, it is easy for attackers to create same colored different appearance phishing websites. Moreover, although authors in [9] use CSS similarity between a targeted legitimate website and a phishing website, attackers can create a similar phishing website without using CSS by embedding legitimate website's appearance to the background image. From this point of view, another requirement has to be fulfilled to improve detection performance:…”
Section: Problem Formulationsmentioning
confidence: 99%
“…In order to detect many types of phishing websites, many approaches have been proposed. We introduce representative approaches [5]- [9]. In [5], Zhang et al propose Cantina which leverages the fact that phishing websites do not appear in the top of the Google's search result.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Phishing-Alarm [25] introduced a model to measure the suspiciousness of websites using the similitude of visual appearance between the websites. This methodology utilized Cascading Style Sheets (CSSs) as the premise to precisely evaluate the visual similitude of each page component.…”
Section: Related Workmentioning
confidence: 99%