نتایج جستجو برای: Phishing Detection

تعداد نتایج: 567318  

2017
A Yahaya Lawal Aliyu Madihah Mohd Saudi Ismail Abdullah

Phishing scam is a well-known fraudulent activity in which victims are tricked to reveal their confidential information especially those related to financial information. There are various phishing schemes such as deceptive phishing, malware based phishing, DNS-based phishing and many more. Therefore in this paper, a systematic review analysis on existing works related with the phishing detecti...

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

Journal: :CoRR 2015
Claudio Marforio Ramya Jayaram Masti Claudio Soriente Kari Kostiainen Srdjan Capkun

Phishing in mobile applications is a relevant threat with successful attacks reported in the wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal user credentials. In this paper we categorize application phishing attacks in mobile platforms and possible countermeasures. We show that personalized security indicators can help users to detect phishing attacks...

2013
Maher Aburrous Adel Khelifi

Detecting phishing website is a complex task which requires significant expert knowledge and experience. So far, various solutions have been proposed and developed to address these problems. Most of these approaches are not able to make a decision dynamically on whether the site is in fact phished, giving rise to a large number of false positives. In this paper we have investigated and develope...

2013
Daisuke Miyamoto Toshiyuki Miyachi Yuzo Taenaka Hiroaki Hazeyama

This paper introduces PhishCage, an experimental infrastructure for phishing detection systems. Due to the short life time of phishing sites, comparative study of effectiveness, especially universality, among the detection systems is difficult. Our key idea is developing a testbed in which preserved phishing sites can be browsed as if they existed in the wild. According to our survey for phishi...

2011
Ram B. Basnet Andrew H. Sung Quingzhong Liu

The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...

2012
Rakesh M. Verma Narasimha Shashidhar Nabil Hossain

Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Email is still the most commonly used medium to launch phishing attacks [1]. In this paper, we present a comprehensive natural language based scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Our scheme utilizes all the informatio...

Journal: :Informatica (Slovenia) 2013
Weifeng Zhang Hua Lu Baowen Xu Hongji Yang

Web phishing is becoming an increasingly severe security threat in the web domain. Effective and efficient phishing detection is very important for protecting web users from loss of sensitive private information and even personal properties. One of the keys of phishing detection is to efficiently search the legitimate web page library and to find those page that are the most similar to a suspic...

2013
Noor Ghazi M. Jameel Loay E. George

Phishing emails are messages designed to fool the recipient into handing over personal information, such as login names, passwords, credit card numbers, account credentials, social security numbers etc. Fraudulent emails harm their victims through loss of funds and identity theft. They also hurt Internet business, because people lose their trust in Internet transactions for fear that they will ...

2015
Gilchan Park Julia M. Taylor

This poster present the result of the comparison of the subject and object of verbs in their usage between phishing emails and legitimate emails. This research aims to investigate whether subjects and objects of verbs can be distinguishable features for phishing detection. This poster also reports the same comparison between old and up-to-date phishing emails to explore if patterns in phishing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید