The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2012 vol.16)
pp: 52-61
Liu Wenyin , City University of Hong Kong
Gang Liu , City University of Hong Kong
Bite Qiu , City University of Hong Kong
Xiaojun Quan , City University of Hong Kong
ABSTRACT
<p>Phishing attacks are growing in both volume and sophistication. The antiphishing method described here collects webpages with either a direct or indirect association with a given suspicious webpage. This enables the discovery of a webpage's so-called "parasitic" community and then ultimately its phishing target &#x2014; that is, the page with the strongest parasitic relationship to the suspicious webpage. Finding this target lets users determine whether the given webpage is a phishing page.</p>
INDEX TERMS
phishing, phishing target, antiphishing, parasitic community, Web document analysis
CITATION
Liu Wenyin, Gang Liu, Bite Qiu, Xiaojun Quan, "Antiphishing through Phishing Target Discovery", IEEE Internet Computing, vol.16, no. 2, pp. 52-61, March-April 2012, doi:10.1109/MIC.2011.103
REFERENCES
1. Global Phishing Survey: Trends and Domain Name Use in 1H2011, tech. report, Antiphishing Working Group, 2011; www.antiphishing.org/reportsAPWG_GlobalPhishingSurvey_1H2011.pdf .
2. "Boom Time for Cybercrime," Consumer Reports, June 2009; www.consumerreports.org/cro/magazine-archive/ june-2009/electronics-computers/state-of-the-net/ overviewstate-of-the-net-ov.htm .
3. W. Liu et al., "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, vol. 10, no. 2, 2006, pp. 58–65.
4. M. Cova, C. Kruegel, and G. Vigna, "There is No Free Phish: An Analysis of 'Free' and Live Phishing Kits," Proc. 2nd Usenix Workshop Offensive Technologies (WOOT 08), Usenix Assoc., 2008, pp. 1–8.
5. G.W. Flake, S. Lawrence, and C.L. Giles, "Efficient Identification of Web Communities," Proc. 6th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, ACM Press, 2000, pp. 150–160.
6. D. Gibson, J. Kleinberg, and P. Raghavan, "Inferring Web Communities from Link Topology," Proc. 9th ACM Conf. Hypertext and Hypermedia, ACM Press, 1998, pp. 225–234.
7. T.H. Cormen et al., Introduction to Algorithms, 2nd ed., MIT Press, 2001.
8. A. Tversky, "Features of Similarity," Psychological Rev., vol. 84, no. 4, 1977, pp. 327–352.
9. W. Liu et al., "Discovering Phishing Target Based on Semantic Link Network," Future Generation Computer Systems, vol. 26, no. 3, 2010, pp. 381–388.
10. J. Ma et al., "Beyond Blacklists: Learning to Detect Malicious Websites from Suspicious URLs," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, ACM Press, 2009, pp. 1245–1254.
11. Y. Zhang, J.I. Hong, and L.F. Cranor, "Cantina: A Content-Based Approach to Detecting Phishing Websites," Proc. 16th Int'l World Wide Web Conf. (WWW 07), ACM Press, 2007, pp. 639–648.
12. G. Xiang and J.I. Hong, "A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval," Proc. 18th Int'l World Wide Web Conf. (WWW 09), ACM Press, 2009, pp. 571–580.
13. G. Liu et al., "Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams," Proc. 7th Symp. Usable Privacy and Security (SOUPS 11), ACM Press, 2011.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool