Sophisticated phishers make more spelling mistakes: using URL similarity against phishing

ME Maurer, L Höfer - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks,
classical blacklist based approaches are not sufficient to protect online users. While …

PhishScore: Hacking phishers' minds

S Marchal, J François, R State… - … conference on network …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Phishnet: predictive blacklisting to detect phishing attacks

P Prakash, M Kumar, RR Kompella… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Phishing has been easy and effective way for trickery and deception on the Internet. While
solutions such as URL blacklisting have been effective to some degree, their reliance on …

PhishStorm: Detecting phishing with streaming analytics

S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Detect phishing by checking content consistency

YS Chen, YH Yu, HS Liu… - Proceedings of the 2014 …, 2014 - ieeexplore.ieee.org
Phishing is a form of cybercrime used to lure a victim to reveal his/her sensitive personal
information to fraudulent web pages. To protect users from phishing attacks, many anti …

Detecting phishing web sites: A heuristic URL-based approach

LAT Nguyen, BL To, HK Nguyen… - 2013 International …, 2013 - ieeexplore.ieee.org
With the growth of Internet, e-commerce plays a vital role in the society. As a result, phishing,
the act of stealing personal user data used in e-commerce transaction, has been becoming …

Visual-similarity-based phishing detection

E Medvet, E Kirda, C Kruegel - … of the 4th international conference on …, 2008 - dl.acm.org
Phishing is a form of online fraud that aims to steal a user's sensitive information, such as
online banking passwords or credit card numbers. The victim is tricked into entering such …

An enhanced blacklist method to detect phishing websites

RS Rao, AR Pais - … Systems Security: 13th International Conference, ICISS …, 2017 - Springer
Existing anti-phishing techniques like whitelist or blacklist detect the phishing sites based on
the database of approved and unapproved URLs. Most of the current phishing attacks are …

Everything is in the name–a URL based approach for phishing detection

H Tupsamudre, AK Singh, S Lodha - International symposium on cyber …, 2019 - Springer
Phishing attack, in which a user is tricked into revealing sensitive information on a spoofed
website, is one of the most common threat to cybersecurity. Most modern web browsers …

Phishing attack detection using a search engine and heuristics-based technique

BB Gupta, AK Jain - Journal of Information Technology Research …, 2020 - igi-global.com
The language used in the textual content of the webpage is the barrier in most of the existing
anti-phishing methods. Most of the existing anti-phishing methods can identify the fake …