Geng et al., 2013 - Google Patents
Favicon-a clue to phishing sites detectionGeng et al., 2013
- Document ID
- 3252018604542513040
- Author
- Geng G
- Lee X
- Wang W
- Tseng S
- Publication year
- Publication venue
- 2013 APWG eCrime Researchers Summit
External Links
Snippet
Phishing is a type of scam designed to steal user's identity. Typically, anti-phishing methods either use blacklists or recognize the phishing pattern with statistical learning. This paper focuses on a tiny but powerful visual element-favicon, which is widely used by phishers but …
- 238000001514 detection method 0 title abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30876—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
Mahajan et al. | Phishing website detection using machine learning algorithms | |
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Ding et al. | A keyword-based combination approach for detecting phishing webpages | |
Tian et al. | Needle in a haystack: Tracking down elite phishing domains in the wild | |
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Tan et al. | PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder | |
Geng et al. | Favicon-a clue to phishing sites detection | |
Jain et al. | A novel approach to protect against phishing attacks at client side using auto-updated white-list | |
Afroz et al. | Phishzoo: Detecting phishing websites by looking at them | |
Deshpande et al. | Detection of phishing websites using Machine Learning | |
Medvet et al. | Visual-similarity-based phishing detection | |
Liu et al. | An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment | |
CN104217160B (en) | A kind of Chinese detection method for phishing site and system | |
Chiew et al. | Leverage website favicon to detect phishing websites | |
EP2104901B1 (en) | Method and apparatus for detecting computer fraud | |
Athulya et al. | Towards the detection of phishing attacks | |
CN109690547A (en) | For detecting the system and method cheated online | |
Van Dooremaal et al. | Combining text and visual features to improve the identification of cloned webpages for early phishing detection | |
Geng et al. | Combating phishing attacks via brand identity and authorization features | |
Banerjee et al. | SUT: Quantifying and mitigating url typosquatting | |
Zaimi et al. | Survey paper: Taxonomy of website anti-phishing solutions | |
Wang et al. | Verilogo: Proactive phishing detection via logo recognition | |
Noh et al. | Phishing website detection using random forest and support vector machine: A comparison | |
Huang et al. | Mitigate web phishing using site signatures |