메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 783-790

User behaviour based phishing websites detection

Author keywords

Identity theft; Phishing attacks; Phishing websites detection; User protection

Indexed keywords

ANALYSIS OF DATA; DATA USERS; DETECTION SYSTEM; IDENTITY THEFT; PHISHERS; PHISHING; PHISHING ATTACKS; PHISHING WEBSITES DETECTION; USER BEHAVIOUR; USER PROTECTION;

EID: 70349323626     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMCSIT.2008.4747332     Document Type: Conference Paper
Times cited : (25)

References (41)
  • 1
    • 70349334973 scopus 로고    scopus 로고
    • http://home.versatel.nl/MAvanEverdingen/Code/.
  • 4
    • 28144458701 scopus 로고    scopus 로고
    • The economy of phishing: A survey of the operations of the phishing market
    • C. Abad. The economy of phishing: A survey of the operations of the phishing market. First Monday, 10(9), 2005.
    • (2005) First Monday , vol.10 , Issue.9
    • Abad, C.1
  • 13
    • 70349318955 scopus 로고    scopus 로고
    • Better website identification and extended validation certifi-cates in ie7 and other browsers
    • November
    • R. Franco. Better website identification and extended validation certifi-cates in ie7 and other browsers. IEBlog, November 2005.
    • (2005) IEBlog
    • Franco, R.1
  • 15
    • 70349305841 scopus 로고    scopus 로고
    • Ietf-draft: Requirements for web authentication resistant to phishing
    • S. Hartman. Ietf-draft: Requirements for web authentication resistant to phishing. Technical report, MIT, 2007.
    • (2007) Technical Report MIT
    • Hartman, S.1
  • 21
    • 70349305840 scopus 로고    scopus 로고
    • P. A. Johnston. *http://pajhome.org.uk/crypt/index.html.
    • Johnston, P.A.1
  • 22
    • 70349320855 scopus 로고    scopus 로고
    • Toolkit: E-commerce loses big because of security concerns
    • A. Litan. Toolkit: E-commerce loses big because of security concerns. Technical report, Garnter Research, 2006.
    • (2006) Technical report, Garnter Research
    • Litan, A.1
  • 23
    • 74549125111 scopus 로고    scopus 로고
    • Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks
    • T. McCall. Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks. Technical report, Gartner Research, 2007.
    • (2007) Technical report, Gartner Research
    • McCall, T.1
  • 24
    • 70349325097 scopus 로고    scopus 로고
    • Microsoft. Anti-phishing white paper
    • Microsoft. Anti-phishing white paper. Technical report, Microsoft, 2005.
    • (2005) Technical report, Microsoft
  • 27
    • 70349318954 scopus 로고    scopus 로고
    • Mozilla. Phishing protection, 2007. http://www.mozilla.com/en-US/firefox/ phishing-protection/.
    • (2007) Mozilla. Phishing Protection
  • 28
    • 70349302772 scopus 로고    scopus 로고
    • Netcraft, 2007. *http://toolbar.netcraft.com/.
    • (2007) Netcraft
  • 31
    • 39049164431 scopus 로고    scopus 로고
    • Anomaly based web phishing page detection
    • Y. Pan and X. Ding. Anomaly based web phishing page detection. acsac, 0:381-392, 2006.
    • (2006) Acsac , pp. 381-392
    • Pan, Y.1    Ding, X.2
  • 32
    • 77957951644 scopus 로고    scopus 로고
    • Phishtank, 2007. http://www.phishtank.com/.
    • (2007) Phishtank
  • 33
    • 34548786769 scopus 로고    scopus 로고
    • The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In 2007 IEEE Symposium on Security and Privacy, 2007.
    • (2007) 2007 IEEE Symposium on Security and Privacy
    • Schechter, S.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 34
    • 70349325095 scopus 로고    scopus 로고
    • Enhancing one-time passwords for protection against real-time phishing attacks
    • R. Security. Enhancing one-time passwords for protection against real-time phishing attacks. Technical report, RSA, 2007.
    • (2007) Technical Report RSA
    • Security, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.