Lohar et al., 2025 - Google Patents
Free-Phish: detecting phishing websites hosted on free web hosting domainsLohar et al., 2025
- Document ID
- 16658701781188748612
- Author
- Lohar R
- Tripathi M
- Shirazi H
- Publication year
- Publication venue
- International Journal of Computers and Applications
External Links
Snippet
Phishing attacks have changed over time, and a family of phishing websites hosted over free web hosting domains (FHDs) are increasing. These can be created and maintained at scale with minimal effort while also effectively evading prevalent anti-phishing detection and …
- 238000001514 detection method 0 abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Das Guptta et al. | Modeling hybrid feature-based phishing websites detection using machine learning techniques | |
Kharraz et al. | Surveylance: Automatically detecting online survey scams | |
Gowtham et al. | A comprehensive and efficacious architecture for detecting phishing webpages | |
James et al. | Detection of phishing URLs using machine learning techniques | |
Gandotra et al. | Improving spoofed website detection using machine learning | |
Zaini et al. | Phishing detection system using machine learning classifiers | |
Kara et al. | Characteristics of understanding URLs and domain names features: the detection of phishing websites with machine learning methods | |
Gupta et al. | Performance analysis of anti-phishing tools and study of classification data mining algorithms for a novel anti-phishing system | |
Du et al. | Tl; dr hazard: A comprehensive study of levelsquatting scams | |
Roy et al. | A large-scale analysis of phishing websites hosted on free web hosting domains | |
Singh et al. | Walkthrough phishing detection techniques | |
Chaudhary et al. | A review on malicious link detection techniques | |
Swarnalatha et al. | Real-time threat intelligence-block phising attacks | |
Thaker et al. | Detecting phishing websites using data mining | |
Abidoye et al. | Hybrid machine learning: A tool to detect phishing attacks in communication networks | |
Mischinger et al. | Ioc stalker: Early detection of indicators of compromise | |
Lohar et al. | Free-Phish: detecting phishing websites hosted on free web hosting domains | |
Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
Gomes de Barros et al. | Piracema: a Phishing snapshot database for building dataset features | |
Radha Damodaram et al. | Bacterial foraging optimization for fake website detection | |
Jansi et al. | An Effective Model of Terminating Phishing Websites and Detection Based On Logistic Regression | |
Hariram | Detection of clickjacking using convolutional neural network | |
Pattewar et al. | Malicious short urls detection: A survey | |
Wang | Mitigating phishing threats |