Issue No. 02 - March/April (2006 vol. 10)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2006.23
Wenyin Liu , City University of Hong Kong
Xiaotie Deng , City University of Hong Kong
Guanglin Huang , City University of Hong Kong
Anthony Y. Fu , City University of Hong Kong
In contrast to text-based approaches, the authors' proposed antiphishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages' similarity to actual sites registered with the system. The first of two sequential processes runs on a local email server and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and overall styles. The approach is designed to be part of an enterprise antiphishing solution.
Security and Trust, Anti-Phishing, Visual Similarity
X. Deng, A. Y. Fu, W. Liu and G. Huang, "An Antiphishing Strategy Based on Visual Similarity Assessment," in IEEE Internet Computing, vol. 10, no. , pp. 58-65, 2006.