Counteracting phishing page polymorphism: An image layout analysis approach

IF Lam, WC Xiao, SC Wang, KT Chen - … , ISA 2009, Seoul, Korea, June 25 …, 2009 - Springer
Many visual similarity-based phishing page detectors have been developed to detect
phishing webpages, however, scammers now create polymorphic phishing pages to breach …

Phishmatch: A layered approach for effective detection of phishing urls

H Tupsamudre, S Jain, S Lodha - arXiv preprint arXiv:2112.02226, 2021 - arxiv.org
Phishing attacks continue to be a significant threat on the Internet. Prior studies show that it
is possible to determine whether a website is phishing or not just by analyzing its URL more …

Phishing in style: Characterizing phishing websites in the wild

D Hasselquist, EK Gawell, A Karlström… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
The prevalence of phishing domains is steadily rising as attackers exploit toolkits to create
phishing websites. As web development expertise is no longer a prerequisite, phishing …

Identifying vulnerable websites by analysis of common strings in phishing URLs

B Wardman, G Shukla, G Warner - 2009 eCrime Researchers …, 2009 - ieeexplore.ieee.org
It has been shown that most phishing sites are created by means of a vulnerable Web server
being re-purposed by a phisher to host a counterfeit Website without the knowledge of the …

Everything is in the name–a URL based approach for phishing detection

H Tupsamudre, AK Singh, S Lodha - International symposium on cyber …, 2019 - Springer
Phishing attack, in which a user is tricked into revealing sensitive information on a spoofed
website, is one of the most common threat to cybersecurity. Most modern web browsers …

Automatic detection of phishing target from phishing webpage

G Liu, B Qiu, L Wenyin - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
An approach to identification of the phishing target of a given (suspicious) webpage is
proposed by clustering the webpage set consisting of its all associated webpages and the …

Phishing detection with popular search engines: Simple and effective

JH Huh, H Kim - Foundations and Practice of Security: 4th Canada …, 2012 - Springer
We propose a new phishing detection heuristic based on the search results returned from
popular web search engines such as Google, Bing and Yahoo. The full URL of a website a …

A framework for detection and measurement of phishing attacks

S Garera, N Provos, M Chew, AD Rubin - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
Phishing is form of identity theft that combines social engineering techniques and
sophisticated attack vectors to harvest financial information from unsuspecting consumers …

A survey and classification of web phishing detection schemes

G Varshney, M Misra, PK Atrey - Security and Communication …, 2016 - Wiley Online Library
Phishing is a fraudulent technique that is used over the Internet to deceive users with the
goal of extracting their personal information such as username, passwords, credit card, and …

Detection of phishing webpages based on visual similarity

L Wenyin, G Huang, L Xiaoyue, Z Min… - Special interest tracks and …, 2005 - dl.acm.org
An approach to detection of phishing webpages based on visual similarity is proposed,
which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate …