scispace - formally typeset
Open AccessJournal ArticleDOI

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity

Reads0
Chats0
TLDR
This paper presents a new solution, called Phishing-Alarm, to detect phishing attacks using features that are hard to evade by attackers, and presents an algorithm to quantify the suspiciousness ratings of Web pages based on the similarity of visual appearance between the Web pages.
Abstract
Social networks have become one of the most popular platforms for users to interact with each other. Given the huge amount of sensitive data available in social network platforms, user privacy protection on social networks has become one of the most urgent research issues. As a traditional information stealing technique, phishing attacks still work in their way to cause a lot of privacy violation incidents. In a Web-based phishing attack, an attacker sets up scam Web pages (pretending to be an important Website such as a social network portal) to lure users to input their private information, such as passwords, social security numbers, credit card numbers, and so on. In fact, the appearance of Web pages is among the most important factors in deceiving users, and thus, the similarity among Web pages is a critical metric for detecting phishing Websites. In this paper, we present a new solution, called Phishing-Alarm, to detect phishing attacks using features that are hard to evade by attackers. In particular, we present an algorithm to quantify the suspiciousness ratings of Web pages based on the similarity of visual appearance between the Web pages. Since cascading style sheet (CSS) is the technique to specify page layout across browser implementations, our approach uses CSS as the basis to accurately quantify the visual similarity of each page element. As page elements do not have the same influence to pages, we base our rating method on weighted page-component similarity. We prototyped our approach in the Google Chrome browser. Our large-scale evaluation using real-world websites shows the effectiveness of our approach. The proof of concept implementation verifies the correctness and accuracy of our approach with a relatively low performance overhead.

read more

Citations
More filters
Journal Article

Phoolproof Phishing Prevention

TL;DR: This work proposes using a trusted device to perform mutual authentication that eliminates reliance on perfect user behavior, thwarts Man-in-the-Middle attacks after setup, and protects a user's account even in the presence of keyloggers and most forms of spyware.
Journal ArticleDOI

Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning

TL;DR: A multidimensional feature phishing detection approach based on a fast detection method by using deep learning that can reduce the detection time for setting a threshold and the experimental results show that the detection efficiency can be improved.
Journal ArticleDOI

Detecting Internet of Things attacks using distributed deep learning

TL;DR: The experiments show that the IoT micro-security add-on running the proposed CNN model is capable of detecting phishing attacks with an accuracy of 94.3% and a F-1 score of 93.58%.
Journal ArticleDOI

Detection of banana plants and their major diseases through aerial images and machine learning methods: A case study in DR Congo and Republic of Benin

TL;DR: Combining high resolution satellite imagery data with advanced machine learning (ML) models through the use of mobile apps could help detect and classify banana plants and provide more information on its overall health status and has high potential to provide a decision support system for major banana diseases in Africa.
Journal ArticleDOI

SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective

TL;DR: This work reexamines the existing research on phishing and spear phishing from the perspective of the unique needs of the security domain, which includes real-time detection, active attacker, dataset quality and base-rate fallacy, and surveys the existing phishing/spear phishing solutions in their light.
References
More filters
Proceedings ArticleDOI

Cantina: a content-based approach to detecting phishing web sites

TL;DR: The design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm, are presented.
Proceedings ArticleDOI

Beyond blacklists: learning to detect malicious web sites from suspicious URLs

TL;DR: This paper describes an approach to this problem based on automated URL classification, using statistical methods to discover the tell-tale lexical and host-based properties of malicious Web site URLs.
Proceedings ArticleDOI

Learning to detect phishing emails

TL;DR: This method is applicable, with slight modification, to detection of phishing websites, or the emails used to direct victims to these sites, and correctly identify over 96% of the phishing emails while only mis-classifying on the order of 0.1%" of the legitimate emails.
Proceedings ArticleDOI

Identifying suspicious URLs: an application of large-scale online learning

TL;DR: It is demonstrated that recently-developed online algorithms can be as accurate as batch techniques, achieving classification accuracies up to 99% over a balanced data set.
Proceedings Article

Client-Side Defense Against Web-Based Identity Theft.

TL;DR: A framework for client-side defense is proposed: a browser plug-in that examines web pages and warns the user when requests for data may be part of a spoof attack.
Related Papers (5)