The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Protecting Users Against Phishing Attacks with AntiPhish
COMPSAC '05 Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01
An Antiphishing Strategy Based on Visual Similarity Assessment
IEEE Internet Computing
Web wallet: preventing phishing attacks by revealing user intentions
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
IEEE Transactions on Dependable and Secure Computing
Cantina: a content-based approach to detecting phishing web sites
Proceedings of the 16th international conference on World Wide Web
Building Anti-Phishing Browser Plug-Ins: An Experience Report
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Security and identification indicators for browsers against spoofing and phishing attacks
ACM Transactions on Internet Technology (TOIT)
On the Effectiveness of Techniques to Detect Phishing Sites
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Method for Evaluating the Security Risk of a Website Against Phishing Attacks
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Fighting Phishing with Discriminative Keypoint Features
IEEE Internet Computing
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Browser-Side Countermeasures for Deceptive Phishing Attack
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
Detecting Phishing Emails Using Hybrid Features
UIC-ATC '09 Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
Discovering phishing target based on semantic link network
Future Generation Computer Systems
"Reminder: please update your details": Phishing Trends
NETCOM '09 Proceedings of the 2009 First International Conference on Networks & Communications
An intrusion detection system for detecting phishing attacks
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Intelligent phishing detection system for e-banking using fuzzy data mining
Expert Systems with Applications: An International Journal
Phish and HIPs: human interactive proofs to detect phishing attacks
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Hi-index | 0.00 |
Despite much research on defense against phishing attacks, incidents continue to occur where sensitive (e.g., personal or financial) information is stolen using social engineering and technical spoofing techniques. Most approaches use the notions of blacklists versus whitelists (WWLs), and it is difficult to quantify the degree of a website's vulnerability against phishing attacks. In this paper, we present a quantitative approach for evaluating the phishing possibility of a given website using the refined security risk elements for domain and web page. Design and implementation of the website risk assessment system for antiphishing are also included. It can detect suspicious websites containing phishing attack and abnormal behavior and generates a warning if website is judged untrustworthy. Copyright © 2012 John Wiley & Sons, Ltd.