The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06)
DOI: 10.1109/wowmom.2006.87
|View full text |Cite
|
Sign up to set email alerts
|

PHONEY: Mimicking User Response to Detect Phishing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(36 citation statements)
references
References 1 publication
0
32
0
Order By: Relevance
“…Abdullah Alnajim et.al. [15] has proposed an approach to the Implementation of the Anti-Phishing tool for Phishing Websites Detection to the implementation of the Anti-Phishing that uses Training Intervention for Phishing Websites Detection (APTIPWD), which also shows that the APTIPWD is feasible and can be implemented within any proxy-based network easily without writing a single line of a programming code and without undue disruption of the users system [16][17][18][19].…”
Section: Previous Research Study On Phishing a Novelmentioning
confidence: 99%
“…Abdullah Alnajim et.al. [15] has proposed an approach to the Implementation of the Anti-Phishing tool for Phishing Websites Detection to the implementation of the Anti-Phishing that uses Training Intervention for Phishing Websites Detection (APTIPWD), which also shows that the APTIPWD is feasible and can be implemented within any proxy-based network easily without writing a single line of a programming code and without undue disruption of the users system [16][17][18][19].…”
Section: Previous Research Study On Phishing a Novelmentioning
confidence: 99%
“…Pandey and Ravi [5] present phishing detection based on text and data mining. Chandrasekaran et al [6] mimicked user responses to detect phishing. Their work places the response before detection to provide the adversary with fake responses.…”
Section: Related Workmentioning
confidence: 99%
“…The phishing campaigns detected earlier are used and the phishers are provided with fake responses to their phishing attempts. Inspired by the related work [6], [8], we propose an automatic response to phishing messages from a honeypot e-mail addresses so that they appear active and vulnerable to phishing. The phisher will add the responding addresses to the recipient list and include them in the next phishing campaign.…”
Section: Attracting Phishersmentioning
confidence: 99%
“…PHONEY is a phishing email detection system that tries to detect phishing emails by mimicking user responses and providing fake information to suspicious web sites that request critical information. The web sites' responses are forwarded to the decision engine for further analysis [4].…”
Section: Technology Countermeasuresmentioning
confidence: 99%