[go: up one dir, main page]

Lohar et al., 2025 - Google Patents

Free-Phish: detecting phishing websites hosted on free web hosting domains

Lohar et al., 2025

Document ID
16658701781188748612
Author
Lohar R
Tripathi M
Shirazi H
Publication year
Publication venue
International Journal of Computers and Applications

External Links

Snippet

Phishing attacks have changed over time, and a family of phishing websites hosted over free web hosting domains (FHDs) are increasing. These can be created and maintained at scale with minimal effort while also effectively evading prevalent anti-phishing detection and …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Das Guptta et al. Modeling hybrid feature-based phishing websites detection using machine learning techniques
Kharraz et al. Surveylance: Automatically detecting online survey scams
Gowtham et al. A comprehensive and efficacious architecture for detecting phishing webpages
James et al. Detection of phishing URLs using machine learning techniques
Gandotra et al. Improving spoofed website detection using machine learning
Zaini et al. Phishing detection system using machine learning classifiers
Kara et al. Characteristics of understanding URLs and domain names features: the detection of phishing websites with machine learning methods
Gupta et al. Performance analysis of anti-phishing tools and study of classification data mining algorithms for a novel anti-phishing system
Du et al. Tl; dr hazard: A comprehensive study of levelsquatting scams
Roy et al. A large-scale analysis of phishing websites hosted on free web hosting domains
Singh et al. Walkthrough phishing detection techniques
Chaudhary et al. A review on malicious link detection techniques
Swarnalatha et al. Real-time threat intelligence-block phising attacks
Thaker et al. Detecting phishing websites using data mining
Abidoye et al. Hybrid machine learning: A tool to detect phishing attacks in communication networks
Mischinger et al. Ioc stalker: Early detection of indicators of compromise
Lohar et al. Free-Phish: detecting phishing websites hosted on free web hosting domains
Chaudhary et al. Recognition of phishing attacks utilizing anomalies in phishing websites
Gomes de Barros et al. Piracema: a Phishing snapshot database for building dataset features
Radha Damodaram et al. Bacterial foraging optimization for fake website detection
Jansi et al. An Effective Model of Terminating Phishing Websites and Detection Based On Logistic Regression
Hariram Detection of clickjacking using convolutional neural network
Pattewar et al. Malicious short urls detection: A survey
Wang Mitigating phishing threats