Real-time client-side phishing prevention add-on

G Armano, S Marchal, N Asokan - 2016 IEEE 36th international …, 2016 - ieeexplore.ieee.org
Since existing solutions for steering users away from phishing websites are typically server-
based, they have several drawbacks: they compromise user privacy, are not robust against …

Know your phish: Novel techniques for detecting phishing sites and their targets

S Marchal, K Saari, N Singh… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Phishing is a major problem on the Web. Despite the significant attention it has received
over the years, there has been no definitive solution. While the state-of-the-art solutions …

Impact of anti-phishing tool performance on attack success rates

A Abbasi, F Zahedi, Y Chen - 2012 IEEE international …, 2012 - ieeexplore.ieee.org
Phishing website-based attacks continue to present significant problems for individual and
enterprise-level security, including identity theft, malware, and viruses. While the …

Information source-based classification of automatic phishing website detectors

H Shahriar, M Zulkernine - 2011 IEEE/IPSJ International …, 2011 - ieeexplore.ieee.org
Phishing attacks allure users to submit their personal information to fake websites that mimic
legitimate websites. Many anti-phishing techniques have emerged in recent years. However …

A comparative analysis and awareness survey of phishing detection tools

H Sharma, E Meenakshi… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to
steal personal information of people. Nowadays various tools are freely available to detect …

PhishTester: automatic testing of phishing attacks

H Shahriar, M Zulkernine - 2010 Fourth International …, 2010 - ieeexplore.ieee.org
Phishing is a web-based attack where users are allured to visit fake websites and provide
their personal information. Traditional anti-phishing tools are successful to mitigate the …

A proactive approach to preventing phishing attacks using Pshark

R Shah, J Trevathan, W Read… - 2009 Sixth International …, 2009 - ieeexplore.ieee.org
Phishing is an online scam used to dupe people out of their personal information for the
purpose of defrauding them. This paper presents a conceptual design for removing phishing …

A proactive discovery and filtering solution on phishing websites

L Fang, W Bailing, H Junheng… - … Conference on Big …, 2015 - ieeexplore.ieee.org
Phishing website is becoming a major threat to the information security in Social Network.
The attacks not only lessen the users' trust but also influence the benefit of the third party …

PhishBox: An approach for phishing validation and detection

JH Li, SD Wang - 2017 IEEE 15th Intl Conf on Dependable …, 2017 - ieeexplore.ieee.org
In this paper, we propose an approach, called PhishBox, to effectively collect phishing data
and generate models for phishing validation and detection. The proposed approach …

Anomaly based web phishing page detection

Y Pan, X Ding - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Many anti-phishing schemes have recently been proposed in literature. Despite all those
efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that …