2015 IEEE International Congress on Big Data 2015
DOI: 10.1109/bigdatacongress.2015.97
|View full text |Cite
|
Sign up to set email alerts
|

Phishing URL Detection Using URL Ranking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 9 publications
0
18
0
5
Order By: Relevance
“…In the Appendix, we give tables with bibliographic numbers of the papers, so that interested readers can easily find the original sources for each entry in our tables in the main part of the paper. Accuracy 28 [21], [29], [30], [34]- [36], [42], [63], [64], [69], [80] [33], [44], [53], [55], [56], [66], [79], [86], [89] [22], [48], [50]- [52], [77], [81], […”
Section: Appendixmentioning
confidence: 99%
“…In the Appendix, we give tables with bibliographic numbers of the papers, so that interested readers can easily find the original sources for each entry in our tables in the main part of the paper. Accuracy 28 [21], [29], [30], [34]- [36], [42], [63], [64], [69], [80] [33], [44], [53], [55], [56], [66], [79], [86], [89] [22], [48], [50]- [52], [77], [81], […”
Section: Appendixmentioning
confidence: 99%
“…Although the use of URL lexical features alone has been shown to result in high accuracy (∼97%) [29,30], phishers have learned how to make predicting a URL destination difficult by carefully manipulating the URL to evade detection [30]- [32]. Therefore, combining these features with others, such as host, is the most effective approach [33].…”
Section: A Url Lexical Featuresmentioning
confidence: 99%
“…It maintains information that is used as features, such as associated IP addresses (host, mail exchange, name server), Autonomous System number, domain name, sender policy framework, associated BGP and country code (e.g. [33,54,55,64]), IP address segments [49], time to live (TTL) [55,57,69,71], the number of resolved IP addresses [56,87], number of name server and the number of IPs name servers associated with [87]. Additionally, the ratio of malicious Autonomous System numbers for the resolved IP address and Name servers associated with the resolved IPs [87].…”
Section: B Host Featuresmentioning
confidence: 99%
“…Phishing attack is an online threat to the users that attempts to steal critical information and personal data through malicious websites. Such attack is performed by mimicking the legitimate websites and steal user data through registration forms, bank account details, chats, messages and further uses the stolen data to fraud users [8]. Common phishing attacks include link manipulation, website forgery and covert redirect.…”
Section: Introductionmentioning
confidence: 99%