Detection of phishing webpages based on visual similarity
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
ICDAR '05 Proceedings of the Eighth International Conference on Document Analysis and Recognition
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fighting phishing at the user interface
Fighting phishing at the user interface
A potential IRI based phishing strategy
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Safeguard against unicode attacks: generation and applications of UC-simlist
Proceedings of the 15th international conference on World Wide Web
The methodology and an application to fight against Unicode attacks
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Web wallet: preventing phishing attacks by revealing user intentions
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Automatic Integrity Checks for Remote Web Resources
IEEE Internet Computing
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
IEEE Transactions on Dependable and Secure Computing
Itrustpage: a user-assisted anti-phishing tool
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Method for Evaluating the Security Risk of a Website Against Phishing Attacks
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
E-Mail Classification for Phishing Defense
ECIR '09 Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Discovering phishing target based on semantic link network
Future Generation Computer Systems
Exposing homograph obfuscation intentions by coloring unicode strings
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Intelligent phishing detection system for e-banking using fuzzy data mining
Expert Systems with Applications: An International Journal
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Finding homoglyphs: a step towards detecting unicode-based visual spoofing attacks
WISE'11 Proceedings of the 12th international conference on Web information system engineering
Journal of Management Information Systems
Phishing detection with popular search engines: simple and effective
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Trustworthiness testing of phishing websites: A behavior model-based approach
Future Generation Computer Systems
Detecting Fake Medical Web Sites Using Recursive Trust Labeling
ACM Transactions on Information Systems (TOIS)
A quantitative approach to estimate a website security risk using whitelist
Security and Communication Networks
Hi-index | 0.00 |
In contrast to text-based approaches, the authors' proposed antiphishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages' similarity to actual sites registered with the system. The first of two sequential processes runs on a local email server and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and overall styles. The approach is designed to be part of an enterprise antiphishing solution.