PhishStorm: Detecting phishing with streaming analytics

S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Everything is in the name–a URL based approach for phishing detection

H Tupsamudre, AK Singh, S Lodha - International symposium on cyber …, 2019 - Springer
Phishing attack, in which a user is tricked into revealing sensitive information on a spoofed
website, is one of the most common threat to cybersecurity. Most modern web browsers …

Phishnet: predictive blacklisting to detect phishing attacks

P Prakash, M Kumar, RR Kompella… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Phishing has been easy and effective way for trickery and deception on the Internet. While
solutions such as URL blacklisting have been effective to some degree, their reliance on …

Phishnot: A cloud-based machine-learning approach to phishing url detection

MM Alani, H Tawfik - Computer Networks, 2022 - Elsevier
Phishing is constantly growing to be one of the most adopted tools for conducting cyber-
attacks. Recent statistics indicated that 97% of users could not recognize a sophisticated …

On the character of phishing URLs: Accurate and robust statistical learning classifiers

R Verma, K Dyer - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
Phishing attacks resulted in an estimated $3.2 billion dollars worth of stolen property in
2007, and the success rate for phishing attacks is increasing each year [17]. Phishing …

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs

W Chu, BB Zhu, F Xue, X Guan… - 2013 IEEE international …, 2013 - ieeexplore.ieee.org
Phishing is the third cyber-security threat globally and the first cyber-security threat in China.
There were 61.69 million phishing victims in China alone from June 2011 to June 2012, with …

Systematization of knowledge (sok): A systematic review of software-based web phishing detection

Z Dou, I Khalil, A Khreishah… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Phishing is a form of cyber attack that leverages social engineering approaches and other
sophisticated techniques to harvest personal information from users of websites. The …

A framework for detection and measurement of phishing attacks

S Garera, N Provos, M Chew, AD Rubin - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
Phishing is form of identity theft that combines social engineering techniques and
sophisticated attack vectors to harvest financial information from unsuspecting consumers …

Phishing url detection: A network-based approach robust to evasion

T Kim, N Park, J Hong, SW Kim - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Many cyberattacks start with disseminating phishing URLs. When clicking these phishing
URLs, the victim's private information is leaked to the attacker. There have been proposed …

Developing a framework for detecting phishing URLs using machine learning

NT Lam - International Journal of Computer Science & Network …, 2023 - koreascience.kr
The attack technique targeting end-users through phishing URLs is very dangerous
nowadays. With this technique, attackers could steal user data or take control of the system …