2018 IEEE International Conference on Intelligence and Security Informatics (ISI) 2018
DOI: 10.1109/isi.2018.8587410
|View full text |Cite
|
Sign up to set email alerts
|

PhishMon: A Machine Learning Framework for Detecting Phishing Webpages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 16 publications
0
17
0
1
Order By: Relevance
“…Several studies analyzed the importance and impact of the features used for learning [2], [14], [15], [17], [18], [20], [22], [26], [28], [29], [37], [40], [44], [56], [64]. Table 2 summarizes them from four aspects: 1) feature ranking methods, 2) top five features, and 3) dataset ratio and 4) dataset sources.…”
Section: B Feature Importancementioning
confidence: 99%
“…Several studies analyzed the importance and impact of the features used for learning [2], [14], [15], [17], [18], [20], [22], [26], [28], [29], [37], [40], [44], [56], [64]. Table 2 summarizes them from four aspects: 1) feature ranking methods, 2) top five features, and 3) dataset ratio and 4) dataset sources.…”
Section: B Feature Importancementioning
confidence: 99%
“…Normal browsing involves two methods known as request and response to allow a user to browse through the web server content. Both methods contain headers which can reveal web applications and their infrastructure [ 24 ]. The request comprises headers such as “Accept”, “Accept-Encoding”, “Accept-Language”, “Authorization”, “Connection”, “Content-Length”, and “Content-Type” [ 25 ].…”
Section: Http Manipulationmentioning
confidence: 99%
“…The sensor utilizes HTTP response code to send message to a requestor once an HTTP has been tampered. Niakanlahiji, et al [ 24 ], on the other hand, adopted the response header in recognizing phishing websites.…”
Section: Http Manipulationmentioning
confidence: 99%
“…The utilization of deep learning out how to order URLs to distinguish Web guests' aims significant hypothetical has and scientific esteem for Web security inquire about, giving new plans to shrewd ideas for security identification. Amirreza Niakanlahiji et al [4] proposed PhishMon, another component rich AI structure to perceive phishing site pages. It relies upon a great deal of fifteen novel highlights that can be efficiently enlisted from a site page without requiring pariah organizations, for instance, web records, or WHOIS servers.…”
Section: Literature Surveymentioning
confidence: 99%