نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

Journal: :EURASIP J. Information Security 2016
Ankit Kumar Jain B. B. Gupta

Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low detection rate while other solutions like visual similarity and machine learning suffer from the fast access time. In this...

2006
Jonathan Zdziarski Weilai Yang Paul Judge

Phishing is a malicious form of Internet fraud with the aim to steal valuable information such as credit cards, social security numbers, and account information. This is accomplished primarily by crafting a faux online presence to masquerade as a legitimate institution and soliciting information from unsuspecting customers. Phishing attacks involving websites are among the most commonplace and ...

Journal: :CoRR 2015
Gilchan Park Julia M. Taylor

This paper reports on the comparison of the subject and object of verbs in their usage between phishing emails and legitimate emails. The purpose of this research is to explore whether the syntactic structures and subjects and objects of verbs can be distinguishable features for phishing detection. To achieve the objective, we have conducted two series of experiments: the syntactic similarity f...

2009
Giovane Cesar Moreira Moura Aiko Pras

This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighbourhood concept, in order to detect and isolate both phishing e-mail senders and phishing web servers. In addition, we propose to develop a self-management architecture that enables ISPs to protec...

Journal: :Technium 2021

The web has turned into a principal part of our conventional social and financial activities. isn't significant for singular clients just yet additionally associations, since associations that offer web-based exchanging can accomplish an upper hand by serving overall customers. Webworks arriving at all around the globe with no commercial center limitations successful utilization internet busine...

2011
Fadi Thabatah Keshav Dahal

Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical...

2018
Prashanth Rajivan Cleotilde Gonzalez

Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two...

Journal: :JNW 2012
Jianyi Zhang Yangxi Ou Dan Li Yang Xin

In this paper, we introduce a prior-based transfer learning method for our statistical machine learning classifier which based on the logistic regression to detect the phishing sites that relies on our selected features of the URLs. Because of the mismatched distributions of the features in different phishing domains, we employ multiple models for different regions. Since it is impossible for u...

2017
B. ESHWAR

The pilot spoofing attack is one kind of active eavesdropping activities conducted by a malicious user during the channel training phase. By transmitting the identical pilot (training) signals as those of the legal users, such an attack is able to manipulate the channel estimation outcome, which may result in a larger channel rate for the adversary but a smaller channel rate for the legitimate ...

2011
Maher Aburrous M. A. Hossain Fadi Thabatah Keshav Dahal

Detecting and identifying e-banking Phishing websites is really a complex and dynamic problem involving many factors and criteria. Because of the subjective considerations and the ambiguities involved in the detection, Fuzzy Data Mining Techniques can be an effective tool in assessing and identifying e-banking phishing websites since it offers a more natural way of dealing with quality factors ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید