2012 Seventh International Conference on Availability, Reliability and Security 2012
DOI: 10.1109/ares.2012.51
|View full text |Cite
|
Sign up to set email alerts
|

Two-Pronged Phish Snagging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Their system displays high accuracy while relying on a relatively small number of classifiers. In [20] a two dimensional approach to detect phishing emails is presented. The proposed framework called PhishSnag, operates between a user's mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the user's inbox.…”
Section: Machine Detectionmentioning
confidence: 99%
“…Their system displays high accuracy while relying on a relatively small number of classifiers. In [20] a two dimensional approach to detect phishing emails is presented. The proposed framework called PhishSnag, operates between a user's mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the user's inbox.…”
Section: Machine Detectionmentioning
confidence: 99%
“…Processing attachments in emails is also an interesting direction for the future. We have reduced our reliance on Google for link analysis [29].…”
Section: Discussionmentioning
confidence: 99%
“…An in-depth discussion of DKIM/SDID is beyond the scope of this paper and the interested reader is referred to RFC 5585 [27] for an overview of the DKIM service and SDID and to the IETF publication RFC 4408 [28] for more information on SPF. In [29], we present a more detailed treatment of headerAnalysis() and present an interesting discussion on the significance of DKIM signatures and SPF through examples.…”
Section: Header Analysismentioning
confidence: 99%
“…First, the offender sends a communication to the target, which 62 of the definitions state. Typically, the offender sends the target an email (n = 30) or sends a message using a method that is not specified (n = 22), occasionally using other methods such as websites (Hodgson 2005;Levy 2004;Olurin et al 2012), social spaces (Piper 2007), instant messages (Ali and Rajamani 2012;Verma et al 2012), text messaging (Hinson 2010) or even letters (Workman 2008). Then, the target may reply by sending information to the offender, which is mentioned in 64 of the definitions, mostly through the use of a website (n = 40).…”
Section: Resultsmentioning
confidence: 99%