[HTML][HTML] Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism

F Tchakounte, JCT Ngnintedem, I Damakoa… - Journal of King Saud …, 2022 - Elsevier
The Web is fed with experiences about phishing, which aim at sharing phisher techniques
and behaviours. We argue that this textual information can be turned into knowledge …

PhishStorm: Detecting phishing with streaming analytics

S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Detect phishing by checking content consistency

YS Chen, YH Yu, HS Liu… - Proceedings of the 2014 …, 2014 - ieeexplore.ieee.org
Phishing is a form of cybercrime used to lure a victim to reveal his/her sensitive personal
information to fraudulent web pages. To protect users from phishing attacks, many anti …

Sophisticated phishers make more spelling mistakes: using URL similarity against phishing

ME Maurer, L Höfer - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks,
classical blacklist based approaches are not sufficient to protect online users. While …

PhishScore: Hacking phishers' minds

S Marchal, J François, R State… - … conference on network …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Detecting phishing webpages via homology analysis of webpage structure

J Feng, Y Qiao, O Ye, Y Zhang - PeerJ Computer Science, 2022 - peerj.com
Phishing webpages are often generated by phishing kits or evolved from existing kits.
Therefore, the homology analysis of phishing webpages can help curb the proliferation of …

Detecting phishing web pages based on DOM-tree structure and graph matching algorithm

LD Nguyen, DN Le, LT Vinh - Proceedings of the 5th Symposium on …, 2014 - dl.acm.org
Most modern day phishing attacks occur by luring users into visiting a malicious web page
that looks and behaves like the original. Phishing is a web-based attack which end users are …

A graph-theoretic approach for the detection of phishing webpages

CL Tan, KL Chiew, KSC Yong, J Abdullah… - Computers & …, 2020 - Elsevier
Over the years, various technical means have been developed to protect Internet users from
phishing attacks. To enrich the anti-phishing efforts, we capitalise on concepts from graph …

A method of detecting phishing web pages based on hungarian matching algorithm

WF Zhang, YM Zhou, L Xu, BW Xu - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
It is the key problem for detecting the phishing pages how to quickly and efficiently to
calculate the similarity of web pages. There is still a large space to improve the detecting …

[HTML][HTML] Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics

C Opara, Y Chen, B Wei - Expert Systems with Applications, 2024 - Elsevier
Phishing websites distribute unsolicited content and are frequently used to commit email
and internet fraud. Detecting them before any user information is submitted is critical …