2016
DOI: 10.1016/j.dss.2016.05.005
|View full text |Cite
|
Sign up to set email alerts
|

PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder

Abstract: A B S T R A C TThis paper proposes a phishing detection technique based on the difference between the target and actual identities of a webpage. The proposed phishing detection approach, called PhishWHO, can be divided into three phases. The first phase extracts identity keywords from the textual contents of the website, where a novel weighted URL tokens system based on the N-gram model is proposed. The second phase finds the target domain name by using a search engine, and the target domain name is selected b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(28 citation statements)
references
References 16 publications
0
27
0
1
Order By: Relevance
“…from unsuspecting users by masking as a trustworthy entity. For example, the victim receives an e-mail from an adversary with a threatening message such as a possible bank or social media account termination or fake alert on illegal transaction (Lin Tan et al, 2016), directing him to a fraudulent website that mimics a legitimate one. The adversary can use any information that the victim enters in the phishing website to steal identity or money (Whittaker et al, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…from unsuspecting users by masking as a trustworthy entity. For example, the victim receives an e-mail from an adversary with a threatening message such as a possible bank or social media account termination or fake alert on illegal transaction (Lin Tan et al, 2016), directing him to a fraudulent website that mimics a legitimate one. The adversary can use any information that the victim enters in the phishing website to steal identity or money (Whittaker et al, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, target-dependent methods identify phishing webpages by highlighting the difference between the current webpage and its phishing target [11], [12]. The key idea is to discover the phishing target of a suspicious webpage.…”
Section: A Background Information and Literature Review For Phishingmentioning
confidence: 99%
“…Abutair and Belghith (2017) used both lexical features and some external features dependent on the Jaccard Index and Alexa ranks to build a phishing detection system using a casebased reasoning model. Tan et al proposed an identity keyword extraction and target domain finder for extracting features from the textual contents of websites and search engines (Tan et al 2016;Tan et al 2017). Xiang et al (2017) built a C5.0-based phishing site detection model by extracting four classes of features, which include address bar-based features, abnormal-based features, JavaScript-based features, and domain-based features.…”
Section: Related Studies On Identifying Malicious Attacksmentioning
confidence: 99%
“…Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, and Yuqing Lin. Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue, Industrial Management & Data Systems, 2018, Accepted, DOI: 10.1108/IMDS-02-2018 Some studies also built malicious web domain identification models using machine learning techniques with features extracted from web page content (Zhang et al 2011;Moghimi and Varjani 2016;Tan et al 2016). Instead of extracting features from URLs or web page content, we explored the use of online credibility and performance data to identify malicious web domains with machine learning techniques (Hu et al 2016).…”
Section: Introductionmentioning
confidence: 99%