A framework for detection and measurement of phishing attacks

作者: Sujata Garera , Niels Provos , Monica Chew , Aviel D. Rubin

DOI: 10.1145/1314389.1314391

关键词:

摘要: Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries lure her victim into clicking URL pointing rogue page. In this paper, we focus on studying the structure URLs employed in various phishing attacks. We find it often possible tell whether or not belongs without requiring any knowledge corresponding page data. describe several features can be used distinguish benign one. These are model logistic regression filter efficient has high accuracy. use perform thorough measurements million quantify prevalence Internet today

参考文章(19)
John C. Mitchell, Neil Chou, Yuka Teraguchi, Robert Ledesma, Client-Side Defense Against Web-Based Identity Theft. network and distributed system security symposium. ,(2004)
Lorrie Cranor, Jason Hong, Serge Egelman, Yue Zhang, Phinding Phish: Evaluating Anti-Phishing Tools Carnegie Mellon University. ,(2006) , 10.1184/R1/6470321.V1
Markus Jakobsson, Modeling and preventing phishing attacks financial cryptography. pp. 89- 89 ,(2005) , 10.1007/11507840_9
Foster Provost, R Fawcett, T, Kohavi, The Case against Accuracy Estimation for Comparing Induction Algorithms international conference on machine learning. pp. 445- 453 ,(1998)
Rachna Dhamija, J. D. Tygar, Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks Human Interactive Proofs. pp. 127- 141 ,(2005) , 10.1007/11427896_9
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Rajeev Motwani, Terry Winograd, Lawrence Page, Sergey Brin, The PageRank Citation Ranking : Bringing Order to the Web the web conference. ,vol. 98, pp. 161- 172 ,(1999)
Stanley Lemeshow, David W. Hosmer, Applied Logistic Regression ,(1989)