2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462216
|View full text |Cite
|
Sign up to set email alerts
|

PhishNet: Predictive Blacklisting to Detect Phishing Attacks

Abstract: Abstract-Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance on exact match with the blacklisted entries makes it easy for attackers to evade. We start with the observation that attackers often employ simple modifications (e.g., changing top level domain) to URLs. Our system, PhishNet, exploits this observation using two components. In the first component, we propose five heuristics to e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
149
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 302 publications
(163 citation statements)
references
References 3 publications
0
149
0
2
Order By: Relevance
“…For instance, Prakash et al (2010) proposed PhishNet to actively predicted new malicious URL from existing blacklist entries. This was achieved by processing URLs and producing multiple variations of the same URL using IP address equivalence, query string substitution, brand name equivalence, directory structure similarity and top level domain replacement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For instance, Prakash et al (2010) proposed PhishNet to actively predicted new malicious URL from existing blacklist entries. This was achieved by processing URLs and producing multiple variations of the same URL using IP address equivalence, query string substitution, brand name equivalence, directory structure similarity and top level domain replacement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[15] have worked on the 27 phishing criteria using the concept of Neural Network. The same criteria have been taken by other researchers to find the solution from phishing attack [16][17][18][19][20]. A survey on the anti-phishing techniques has been done which is helpful in this study [32].…”
Section: Related Work On Browser Based Anti-phishing Toolmentioning
confidence: 99%
“…Cybercriminals have also mitigated the efficacy of successful detections by churning through a large set of domains and URLs, with domain flux and URL fluxing [11,26,38,25]. Researchers, in turn, noting that this behavior is generally associated with malicious sites, have used it as a detection feature [20,31]. These fluxing infrastructures are also being detected mining their topology [17], the redirection chains leading to them [24,40,21], and the traffic distributors' system feeding them a stream of users to exploit [22].…”
Section: Related Workmentioning
confidence: 99%