Phishing detection based on newly registered domains

X Li, G Geng, Z Yan, Y Chen… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
Phishing is a security attack that involves the creation of websites that mimic legitimate
websites, and these fraud websites bring Internet users a lot of loss. Traditional anti-phishing …

Boosting the phishing detection performance by semantic analysis

X Zhang, Y Zeng, XB Jin, ZW Yan… - 2017 ieee international …, 2017 - ieeexplore.ieee.org
Phishing is increasingly severe in recent years, which seriously threatens the privacy and
property security of netizens. Phishing is essentially a counterfeiting of brands. In order to …

A proactive discovery and filtering solution on phishing websites

L Fang, W Bailing, H Junheng… - … Conference on Big …, 2015 - ieeexplore.ieee.org
Phishing website is becoming a major threat to the information security in Social Network.
The attacks not only lessen the users' trust but also influence the benefit of the third party …

PhishBox: An approach for phishing validation and detection

JH Li, SD Wang - 2017 IEEE 15th Intl Conf on Dependable …, 2017 - ieeexplore.ieee.org
In this paper, we propose an approach, called PhishBox, to effectively collect phishing data
and generate models for phishing validation and detection. The proposed approach …

Impact of security awareness training on phishing click-through rates

A Carella, M Kotsoev, TM Truta - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In this paper we study the impact that security awareness training has on the people who
click on malicious links contained in phishing emails. Phishing is a criminal activity in which …

URL based gateway side phishing detection method

J Zhang, Y Pan, Z Wang, B Liu - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Phishing attack has become the most dangerous form of fraud to hit online and mobile
businesses. In this paper, we reveal some new aspects of the common features that appear …

Research and design of phishing alarm system at client terminal

M Qi, C Yang - 2006 IEEE Asia-Pacific Conference on Services …, 2006 - ieeexplore.ieee.org
In this paper, it analyses phishing's characteristics and harms, and finds out the sticking
point of phishing. Then it designs and realizes the alarm system according to phishing's …

Examination of data, rule generation and detection of phishing URLs using online logistic regression

MN Feroz, S Mengel - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
Web services such as online banking, gaming, and social networking have rapidly evolved
as has the reliance upon them by people to perform everyday tasks. As a result, a large …

A hybrid system to find & fight phishing attacks actively

H Bo, W Wei, W Liming, G Guanggang… - 2011 IEEE/WIC/ACM …, 2011 - ieeexplore.ieee.org
Traditional anti-phishing methods and tools always worked in a passive way to receive
users' submission and determine phishing URLs. Usually, they are not fast and efficient …

Evaluation of online resources in assisting phishing detection

K Bian, MS Hsiao, F Belanger… - 2009 Ninth Annual …, 2009 - ieeexplore.ieee.org
Phishing is an attempt to fraudulently acquire users' sensitive information, such as
passwords or financial information, by masquerading as a trustworthy entity in online …