[go: up one dir, main page]

Tan et al., 2016 - Google Patents

PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder

Tan et al., 2016

Document ID
15864288966398490461
Author
Tan C
Chiew K
Wong K
Sze S
Publication year
Publication venue
Decision Support Systems

External Links

Snippet

This paper proposes a phishing detection technique based on the difference between the target and actual identities of a webpage. The proposed phishing detection approach, called PhishWHO, can be divided into three phases. The first phase extracts identity keywords from …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • G06F17/3066Query translation
    • G06F17/30669Translation of the query language, e.g. Chinese to English
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/3087Spatially dependent indexing and retrieval, e.g. location dependent results to queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • G06F17/30675Query execution
    • G06F17/30684Query execution using natural language analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30637Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30876Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30731Creation of semantic tools
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre

Similar Documents

Publication Publication Date Title
Tan et al. PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Vijayalakshmi et al. Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Rao et al. Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Rao et al. CatchPhish: detection of phishing websites by inspecting URLs
Jain et al. Towards detection of phishing websites on client-side using machine learning based approach
Jain et al. Two-level authentication approach to protect from phishing attacks in real time
Shirazi et al. " Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
Jain et al. Phishing detection: analysis of visual similarity based approaches
Dunlop et al. Goldphish: Using images for content-based phishing analysis
Ramesh et al. An efficacious method for detecting phishing webpages through target domain identification
Jain et al. Comparative analysis of features based machine learning approaches for phishing detection
US20090089859A1 (en) Method and apparatus for detecting phishing attempts solicited by electronic mail
Chiew et al. Leverage website favicon to detect phishing websites
Gandotra et al. Improving spoofed website detection using machine learning
Tan et al. Phishing website detection using URL-assisted brand name weighting system
Geng et al. Combating phishing attacks via brand identity and authorization features
Jain et al. Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation
Tharani et al. Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Roopak et al. A novel phishing page detection mechanism using html source code comparison and cosine similarity
Noh et al. Phishing website detection using random forest and support vector machine: A comparison
Dangwal et al. Feature selection for machine learning-based phishing websites detection
Swarnalatha et al. Real-time threat intelligence-block phising attacks