Britt et al., 2012 - Google Patents
Clustering Potential Phishing Websites Using {DeepMD5}Britt et al., 2012
View PDF- Document ID
- 69454832105355524
- Author
- Britt J
- Wardman B
- Sprague A
- Warner G
- Publication year
- Publication venue
- 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12)
External Links
Snippet
Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing problem. Examining and …
- 238000009114 investigational therapy 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Javed et al. | A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions | |
US10218740B1 (en) | Fuzzy hash of behavioral results | |
US10505986B1 (en) | Sensor based rules for responding to malicious activity | |
CN103843003B (en) | The method of recognition network fishing website | |
Britt et al. | Clustering Potential Phishing Websites Using {DeepMD5} | |
US8769695B2 (en) | Phish probability scoring model | |
Rao et al. | Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach | |
Niakanlahiji et al. | Phishmon: A machine learning framework for detecting phishing webpages | |
Mohaisen et al. | Unveiling zeus: automated classification of malware samples | |
Abubakar et al. | A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems | |
US8955133B2 (en) | Applying antimalware logic without revealing the antimalware logic to adversaries | |
Chu et al. | Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs | |
Wardman et al. | High-performance content-based phishing attack detection | |
Xiao et al. | From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild | |
CN106650799B (en) | A kind of electronic evidence classification extracting method and system | |
Singh et al. | Investigating the effect of feature selection and dimensionality reduction on phishing website classification problem | |
Abraham et al. | Approximate string matching algorithm for phishing detection | |
Priya et al. | Detection of phishing websites using C4. 5 data mining algorithm | |
US8910281B1 (en) | Identifying malware sources using phishing kit templates | |
Huh et al. | A comprehensive analysis of today’s malware and its distribution network: Common adversary strategies and implications | |
Zawoad et al. | Phish-net: investigating phish clusters using drop email addresses | |
Shrestha et al. | High-performance classification of phishing URLs using a multi-modal approach with MapReduce | |
Wardman et al. | New tackle to catch a phisher | |
Li et al. | Spoofingguard: A content-agnostic framework for email spoofing detection via delivery graph | |
Wardman et al. | Reeling in big phish with a deep md5 net |