Detecting phishing websites with random forest

S Hutchinson, Z Zhang, Q Liu - … , MLICOM 2018, Hangzhou, China, July 6 …, 2018 - Springer
Phishing has been a widespread issue for many years, claiming countless victims, some of
which have not even realized that they fell prey. The sole purpose of phishing is to obtain …

New tackle to catch a phisher

B Wardman, J Britt, G Warner - International Journal of …, 2014 - inderscienceonline.com
Organisations continue to pursue new strategies to thwart phishing attacks as well as
investigate the criminals behind these scams. In order to address these issues, a novel …

An ideal approach for detection and prevention of phishing attacks

NM Shekokar, C Shah, M Mahajan, S Rachh - Procedia Computer Science, 2015 - Elsevier
Phishing is a treacherous attempt to embezzle personal information such as bank account
details, credit card information, social security number, employment details, and online …

Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

M Vijayalakshmi, S Mercy Shalinie, MH Yang… - Iet …, 2020 - Wiley Online Library
Internet dragged more than half of the world's population into the cyber world. Unfortunately,
with the increase in internet transactions, cybercrimes also increase rapidly. With the …

Web phishing detection using classifier ensemble

N Sanglerdsinlapachai, A Rungsawang - Proceedings of the 12th …, 2010 - dl.acm.org
This research adapts and develops various methods in Artificial Intelligent (AI) field to
improve web phishing detection. Based on the features from Carnegie Mellon Anti-phishing …

Phishing website detection based on effective CSS features of web pages

J Mao, W Tian, P Li, T Wei, Z Liang - … , WASA 2017, Guilin, China, June 19 …, 2017 - Springer
In a web-based phishing attack, an attacker sets up scam web pages to deceive users to
input their sensitive information. The appearance of web pages plays an important role in …

A novel phishing page detection mechanism using html source code comparison and cosine similarity

S Roopak, T Thomas - 2014 Fourth International Conference …, 2014 - ieeexplore.ieee.org
Phishing is a social engineering technique used by hackers to steal information and
sometimes money from online users. Phishing web sites are imitating sites of other …

A robust defense mechanism to prevent phishing attack using parse tree validation

V Shanmughaneethi, R Abraham… - … , Networking and Security …, 2012 - Springer
In modern era, Web-based applications and services have changed the landscape of
information delivery and exchange in today's corporate, government and educational …

Poster: Proactive blacklist update for anti-phishing

LH Lee, KC Lee, HH Chen, YH Tseng - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
This study explores the existing blacklists to discover suspected URLs that refer to on-the-fly
phishing threats in real time. We propose a PhishTrack framework that includes redirection …

Phishnet: predictive blacklisting to detect phishing attacks

P Prakash, M Kumar, RR Kompella… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Phishing has been easy and effective way for trickery and deception on the Internet. While
solutions such as URL blacklisting have been effective to some degree, their reliance on …