[go: up one dir, main page]

Geng et al., 2013 - Google Patents

Favicon-a clue to phishing sites detection

Geng et al., 2013

Document ID
3252018604542513040
Author
Geng G
Lee X
Wang W
Tseng S
Publication year
Publication venue
2013 APWG eCrime Researchers Summit

External Links

Snippet

Phishing is a type of scam designed to steal user's identity. Typically, anti-phishing methods either use blacklists or recognize the phishing pattern with statistical learning. This paper focuses on a tiny but powerful visual element-favicon, which is widely used by phishers but …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30876Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30899Browsing optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre

Similar Documents

Publication Publication Date Title
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Mahajan et al. Phishing website detection using machine learning algorithms
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Ding et al. A keyword-based combination approach for detecting phishing webpages
Tian et al. Needle in a haystack: Tracking down elite phishing domains in the wild
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Tan et al. PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Geng et al. Favicon-a clue to phishing sites detection
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
Afroz et al. Phishzoo: Detecting phishing websites by looking at them
Deshpande et al. Detection of phishing websites using Machine Learning
Medvet et al. Visual-similarity-based phishing detection
Liu et al. An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment
CN104217160B (en) A kind of Chinese detection method for phishing site and system
Chiew et al. Leverage website favicon to detect phishing websites
EP2104901B1 (en) Method and apparatus for detecting computer fraud
Athulya et al. Towards the detection of phishing attacks
CN109690547A (en) For detecting the system and method cheated online
Van Dooremaal et al. Combining text and visual features to improve the identification of cloned webpages for early phishing detection
Geng et al. Combating phishing attacks via brand identity and authorization features
Banerjee et al. SUT: Quantifying and mitigating url typosquatting
Zaimi et al. Survey paper: Taxonomy of website anti-phishing solutions
Wang et al. Verilogo: Proactive phishing detection via logo recognition
Noh et al. Phishing website detection using random forest and support vector machine: A comparison
Huang et al. Mitigate web phishing using site signatures