Introduction to Modern Information Retrieval
Introduction to Modern Information Retrieval
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
A convenient method for securely managing passwords
WWW '05 Proceedings of the 14th international conference on World Wide Web
ACM Transactions on Information and System Security (TISSEC)
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Passpet: convenient password management and phishing protection
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Web wallet: preventing phishing attacks by revealing user intentions
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Protecting people from phishing: the design and evaluation of an embedded training email system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Learning to detect phishing emails
Proceedings of the 16th international conference on World Wide Web
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Itrustpage: a user-assisted anti-phishing tool
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
iPhish: phishing vulnerabilities on consumer electronics
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Behind phishing: an examination of phisher modi operandi
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Phishwish: A Stateless Phishing Filter Using Minimal Rules
Financial Cryptography and Data Security
Anti-phishing based on automated individual white-list
Proceedings of the 4th ACM workshop on Digital identity management
A hybrid phish detection approach by identity discovery and keywords retrieval
Proceedings of the 18th international conference on World wide web
E-Mail Classification for Phishing Defense
ECIR '09 Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
An integrated approach to detect phishing mail attacks: a case study
Proceedings of the 2nd international conference on Security of information and networks
Discovering phishing target based on semantic link network
Future Generation Computer Systems
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites
ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
New filtering approaches for phishing email
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Detecting visually similar Web pages: Application to phishing detection
ACM Transactions on Internet Technology (TOIT)
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT)
An intrusion detection system for detecting phishing attacks
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
An evaluation of machine learning-based methods for detection of phishing sites
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
Phishnet: predictive blacklisting to detect phishing attacks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure online banking on untrusted computers
Proceedings of the 17th ACM conference on Computer and communications security
Lexical feature based phishing URL detection using online learning
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
A hierarchical adaptive probabilistic approach for zero hour phish detection
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Learning to detect malicious URLs
ACM Transactions on Intelligent Systems and Technology (TIST)
Web phishing detection using classifier ensemble
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Using one-time passwords to prevent password phishing attacks
Journal of Network and Computer Applications
An efficient phishing webpage detector
Expert Systems with Applications: An International Journal
Detecting malicious web links and identifying their attack types
WebApps'11 Proceedings of the 2nd USENIX conference on Web application development
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites
ACM Transactions on Information and System Security (TISSEC)
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Communications of the ACM
Socio-technological phishing prevention
Information Security Tech. Report
Proceedings of the Seventh Symposium on Usable Privacy and Security
Poster: CUD: crowdsourcing for URL spam detection
Proceedings of the 18th ACM conference on Computer and communications security
Phishing detection with popular search engines: simple and effective
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Clustering potential phishing websites using DeepMD5
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Trustworthiness testing of phishing websites: A behavior model-based approach
Future Generation Computer Systems
Using automated individual white-list to protect web digital identities
Expert Systems with Applications: An International Journal
PKI as part of an integrated risk management strategy for web security
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Secret information display based authentication technique towards preventing phishing attacks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Feature selection for improved phishing detection
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
A quantitative approach to estimate a website security risk using whitelist
Security and Communication Networks
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Sophisticated phishers make more spelling mistakes: using URL similarity against phishing
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Intelligent phishing detection and protection scheme for online transactions
Expert Systems with Applications: An International Journal
PhishLive: a view of phishing and malware attacks from an edge router
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
TabShots: client-side detection of tabnabbing attacks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Cost-sensitive online active learning with application to malicious URL detection
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
PhishCage: reproduction of fraudulent websites in the emulated internet
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
International Journal of Human-Computer Studies
Hi-index | 0.02 |
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm. We also discuss the design and evaluation of several heuristics we developed to reduce false positives. Our experiments show that CANTINA is good at detecting phishing sites, correctly labeling approximately 95% of phishing sites.