The image processing handbook (2nd ed.)
The image processing handbook (2nd ed.)
Collection statistics for fast duplicate document detection
ACM Transactions on Information Systems (TOIS)
Visual Based Content Understanding towards Web Adaptation
AH '02 Proceedings of the Second International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems
Improving pseudo-relevance feedback in web information retrieval using web page segmentation
WWW '03 Proceedings of the 12th international conference on World Wide Web
Detecting web page structure for adaptive viewing on small form factor devices
WWW '03 Proceedings of the 12th international conference on World Wide Web
Detection of phishing webpages based on visual similarity
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
ICDAR '05 Proceedings of the Eighth International Conference on Document Analysis and Recognition
An Antiphishing Strategy Based on Visual Similarity Assessment
IEEE Internet Computing
Web wallet: preventing phishing attacks by revealing user intentions
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
A potential IRI based phishing strategy
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Efficient EMD-based similarity search in multimedia databases via flexible dimensionality reduction
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Method for Evaluating the Security Risk of a Website Against Phishing Attacks
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Detecting visually similar Web pages: Application to phishing detection
ACM Transactions on Internet Technology (TOIT)
Intelligent phishing detection system for e-banking using fuzzy data mining
Expert Systems with Applications: An International Journal
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Secure online banking on untrusted computers
Proceedings of the 17th ACM conference on Computer and communications security
Web phishing detection using classifier ensemble
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
On nonmetric similarity search problems in complex domains
ACM Computing Surveys (CSUR)
Using one-time passwords to prevent password phishing attacks
Journal of Network and Computer Applications
Finding homoglyphs: a step towards detecting unicode-based visual spoofing attacks
WISE'11 Proceedings of the 12th international conference on Web information system engineering
A multi-level matching method with hybrid similarity for document retrieval
Expert Systems with Applications: An International Journal
Journal of Management Information Systems
Phishing detection with popular search engines: simple and effective
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Using automated individual white-list to protect web digital identities
Expert Systems with Applications: An International Journal
Structural and visual comparisons for web page archiving
Proceedings of the 2012 ACM symposium on Document engineering
Detecting Fake Medical Web Sites Using Recursive Trust Labeling
ACM Transactions on Information Systems (TOIS)
A quantitative approach to estimate a website security risk using whitelist
Security and Communication Networks
A multi-tier phishing detection and filtering approach
Journal of Network and Computer Applications
WS-Finder: a framework for similarity search of web services
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
ScreenPass: secure password entry on touchscreen devices
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
PhishCage: reproduction of fraudulent websites in the emulated internet
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Hi-index | 0.01 |
An effective approach to phishing Web page detection is proposed, which uses Earth Mover's Distance (EMD) to measure Web page visual similarity. We first convert the involved Web pages into low resolution images and then use color and coordinate features to represent the image signatures. We use EMD to calculate the signature distances of the images of the Web pages. We train an EMD threshold vector for classifying a Web page as a phishing or a normal one. Large-scale experiments with 10,281 suspected Web pages are carried out to show high classification precision, phishing recall, and applicable time performance for online enterprise solution. We also compare our method with two others to manifest its advantage. We also built up a real system which is already used online and it has caught many real phishing cases.