Approaches to Phishing Identification Using Match and Probabilistic Digital Fingerprinting Techniques
نویسندگان
چکیده
Phishing is a malicious form of Internet fraud with the aim to steal valuable information such as credit cards, social security numbers, and account information. This is accomplished primarily by crafting a faux online presence to masquerade as a legitimate institution and soliciting information from unsuspecting customers. Phishing attacks involving websites are among the most commonplace and effective types of online fraud, having the potential to cost both victims and targeted organizations in privacy, reputation, and monetarily. Due to the malicious nature of phishing attacks, identifying them bears higher demands in detection than filtering spam or other nuisance content. This paper establishes some requirements for phishing identification and explains various approaches to detection by looking for copying of web site layout and structure through source code (and optionally image) fingerprinting. This enables us to perform a number of exact-match comparisons to genuine websites or to other known attacks. Lastly, we also explore techniques to correlate different attacks to a single likely source.
منابع مشابه
A Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection
Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...
متن کاملInformation Theoretical Analysis of Identification based on Active Content Fingerprinting
Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called active content fingerprinting was introduced to overcome these shortcomings. Active content fingerprinting aims to m...
متن کاملphishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
Identity theft is one of the most profitable crimes committed by felons. In the cyber space, this is commonly achieved using phishing. We propose here robust server side methodology to detect phishing attacks, called phishGILLNET, which incorporates the power of natural language processing and machine learning techniques. phishGILLNET is a multi-layered approach to detect phishing attacks. The ...
متن کاملSports Result Prediction Based on Machine Learning and Computational Intelligence Approaches: A Survey
In the current world, sports produce considerable statistical information about each player, team, games, and seasons. Traditional sports science believed science to be owned by experts, coaches, team managers, and analyzers. However, sports organizations have recently realized the abundant science available in their data and sought to take advantage of that science through the use of data mini...
متن کاملFingerprinting of some Egyptian rice genotypes using Intron-exon Splice Junctions (ISJ) markers
DNA fingerprinting has become an important tool for diversity assessment and varietal identification in plant breeding programs. Semi- random PCR primers targeting intron-exon splice junctions (ISJ) were used to evaluate the potential of these markers in identification and classification of rice genotypes. A total of 12 ISJ primers were used for screening fourteen Egyptian rice genotypes, inclu...
متن کامل