A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Phishing detection leveraging machine learning and deep learning: A review

DM Divakaran, A Oest - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
Phishing attacks trick victims into disclosing sensitive information. To counter them, we
explore machine learning and deep learning models leveraging large-scale data. We …

Phishing or not phishing? A survey on the detection of phishing websites

R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …

Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach

R Liu, Y Lin, X Yang, SH Ng, DM Divakaran… - 31st USENIX Security …, 2022 - usenix.org
Explainable phishing detection approaches are usually based on references, ie, they
compare a suspicious webpage against a reference list of commonly targeted legitimate …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …

Generating phishing attacks using chatgpt

SS Roy, KV Naragam, S Nilizadeh - arXiv preprint arXiv:2305.05133, 2023 - arxiv.org
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …

Phishing URL detection: A real-case scenario through login URLs

M Sánchez-Paniagua, EF Fernández, E Alegre… - IEEE …, 2022 - ieeexplore.ieee.org
Phishing is a social engineering cyberattack where criminals deceive users to obtain their
credentials through a login form that submits the data to a malicious server. In this paper, we …

[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - jianjunchen.com
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

[HTML][HTML] The applicability of a hybrid framework for automated phishing detection

RJ van Geest, G Cascavilla, J Hulstijn, N Zannone - Computers & Security, 2024 - Elsevier
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital
landscape. As cybercriminals continually adapt their techniques, automated phishing …

Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning

G Apruzzese, M Conti, Y Yuan - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …