메뉴 건너뛰기




Volumn , Issue , 2009, Pages 265-272

Modelling intelligent phishing detection system for e-banking using Fuzzy Data Mining

Author keywords

Apriori; Association; Classification; Data mining; E banking risk assessment; Fuzzy logic; Phishing

Indexed keywords

APRIORI; ASSOCIATION; ASSOCIATION CLASSIFICATION; E-BANKING; E-BANKING RISK ASSESSMENT; PHISHING;

EID: 72349089708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CW.2009.43     Document Type: Conference Paper
Times cited : (21)

References (44)
  • 2
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, September 2007
    • Anti-Phishing Working Group. Phishing Activity Trends Report, http://antiphishing.org/reports/apwg-report-sep2007-final.pdf. September 2007.
    • Phishing Activity Trends Report
  • 4
    • 3042514639 scopus 로고    scopus 로고
    • fuzzy data mining and genetic algorithms applied to intrusion detection
    • Department of Computer Science Mississippi State University, White Paper
    • S. M. Bridges and R. B. Vaughn, "fuzzy data mining and genetic algorithms applied to intrusion detection," Department of Computer Science Mississippi State University, White Paper, 2001.
    • (2001)
    • Bridges, S.M.1    Vaughn, R.B.2
  • 7
    • 33751538239 scopus 로고    scopus 로고
    • Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
    • A. Y. Fu, L. Wenyin and X. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)," IEEE transactions on dependable and secure computing, vol. 3, no. 4, 2006.
    • (2006) IEEE transactions on dependable and secure computing , vol.3 , Issue.4
    • Fu, A.Y.1    Wenyin, L.2    Deng, X.3
  • 8
    • 49149087472 scopus 로고    scopus 로고
    • Protecting Naive Web Users
    • Draft of July 18
    • A. Herzberg and A. Gbara, "Protecting Naive Web Users," Draft of July 18, 2004.
    • (2004)
    • Herzberg, A.1    Gbara, A.2
  • 9
    • 33750395096 scopus 로고    scopus 로고
    • Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma-Delta Modulators
    • Regular Papers, October
    • C. Y. Ho, B. W. Ling and J. D. Reiss, "Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma-Delta Modulators," IEEE Transactions on Circuits and Systems-I: Regular Papers, Vol. 53, No. 10, October 2006.
    • (2006) IEEE Transactions on Circuits and Systems-I , vol.53 , Issue.10
    • Ho, C.Y.1    Ling, B.W.2    Reiss, J.D.3
  • 10
    • 85167754239 scopus 로고    scopus 로고
    • Phishing Exposed
    • Tech Target Article sponsored by: Sunbelt software, searchexchange.com
    • L. James, "Phishing Exposed," Tech Target Article sponsored by: Sunbelt software, searchexchange.com, 2006.
    • (2006)
    • James, L.1
  • 15
    • 49149087981 scopus 로고    scopus 로고
    • AOL tests caller ID for e-mail
    • CNET News.com, January 22
    • S. Olsen, "AOL tests caller ID for e-mail," CNET News.com, January 22, 2004.
    • (2004)
    • Olsen, S.1
  • 17
    • 49149101751 scopus 로고    scopus 로고
    • Yahoo airs antispam initiative
    • ComputerWeekly.com, December 8
    • J. C. Perez, "Yahoo airs antispam initiative," ComputerWeekly.com, December 8, 2003.
    • (2003)
    • Perez, J.C.1
  • 19
    • 33745861599 scopus 로고    scopus 로고
    • September 9, 2006
    • T. Sharif, "Phishing Filter in IE7," http://blogs.msdn.com/ie/ archive/2005/09/09/463204.aspx, September 9, 2006.
    • Phishing Filter in IE7
    • Sharif, T.1
  • 21
    • 33745867321 scopus 로고    scopus 로고
    • Do Security Toolbars Actually Prevent Phishing Attacks?
    • April
    • M. Wu, R. C. Miller and S. L. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?," CHI April 2006.
    • (2006) CHI
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 23
    • 72349100599 scopus 로고    scopus 로고
    • Exploring Phishing Attacks and Countermeasures
    • Master Thesis in Computer Science, Thesis No:, September
    • Anders Persson, "Exploring Phishing Attacks and Countermeasures", Master Thesis in Computer Science, Thesis No: MCS-2007:18, September 2007.
    • (2007) , vol.MCS-2007 , pp. 18
    • Persson, A.1
  • 25
    • 72349097035 scopus 로고    scopus 로고
    • Putting an end to account-hijacking identity theft, FDIC, Tech. Rep., Dec. 2004. [Online]. Available: http://www.fdic.gov/consumers/ consumer/idtheftstudy/identitytheft.pdf.
    • "Putting an end to account-hijacking identity theft," FDIC, Tech. Rep., Dec. 2004. [Online]. Available: http://www.fdic.gov/consumers/ consumer/idtheftstudy/identitytheft.pdf.
  • 27
    • 72349083000 scopus 로고    scopus 로고
    • WEKA - University of Waikato, New Zealand, EN, 2006: Weka - Data Mining with Open Source Machine Learning Software in Java; http://www.cs.waikato.ac.nz/ml/weka (2006/01/31).
    • WEKA - University of Waikato, New Zealand, EN, 2006: "Weka - Data Mining with Open Source Machine Learning Software in Java"; http://www.cs.waikato.ac.nz/ml/weka (2006/01/31).
  • 28
    • 72349098152 scopus 로고    scopus 로고
    • Sebastian Misch, Content Negotiatio in Internet Mail, Diploma Thesis, University of Applied Sciences Cologne, Mat.No.: 7042524, February 2006.
    • Sebastian Misch, "Content Negotiatio in Internet Mail", Diploma Thesis, University of Applied Sciences Cologne, Mat.No.: 7042524, February 2006.
  • 30
    • 72349090889 scopus 로고    scopus 로고
    • Lyman, Peter; Hal R. Varian (2003). How Much Information. http://www.sims.berkeley.edu/how-much-info-2003. Retrieved on 2008-12-17.
    • Lyman, Peter; Hal R. Varian (2003). "How Much Information". http://www.sims.berkeley.edu/how-much-info-2003. Retrieved on 2008-12-17.
  • 31
    • 72349095778 scopus 로고    scopus 로고
    • Kantardzic and Mehmed. Data Mining: Concepts, Models, Methods, and Algorithms., John Wiley & Sons. ISBN 0471228524. OCLC 50055336, 2003.
    • Kantardzic and Mehmed. "Data Mining: Concepts, Models, Methods, and Algorithms.", John Wiley & Sons. ISBN 0471228524. OCLC 50055336, 2003.
  • 32
    • 0003280548 scopus 로고    scopus 로고
    • Mining Databases: Towards Algorithms for Knowledge Discovery
    • U.M. Fayyad, "Mining Databases: Towards Algorithms for Knowledge Discovery," Data Eng. Bull., vol. 21, no. 1, pp. 39-48, 1998.
    • (1998) Data Eng. Bull , vol.21 , Issue.1 , pp. 39-48
    • Fayyad, U.M.1
  • 35
    • 0024103809 scopus 로고
    • PRISM: An algorithm for inducing modular rule
    • J. Cendrowska. "PRISM: An algorithm for inducing modular rule", International Journal of Man-Machine Studies (1987), Vol.27, No.4, pp.349-370.
    • (1987) International Journal of Man-Machine Studies , vol.27 , Issue.4 , pp. 349-370
    • Cendrowska, J.1
  • 37
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • Santiage, Chile: Morgan Kaufmann, Los Altos, CA
    • R. Agrawal and R. Srikant, "Fast algorithms for mining association rules in large databases", Proc International Conference on Very Large Databases, pp. 478-499. Santiage, Chile: Morgan Kaufmann, Los Altos, CA, 1994.
    • (1994) Proc International Conference on Very Large Databases , pp. 478-499
    • Agrawal, R.1    Srikant, R.2
  • 39
    • 72349090016 scopus 로고    scopus 로고
    • http://www.phishtank.com/phish-archive.php
  • 40
    • 84962671851 scopus 로고    scopus 로고
    • Centroid-Based Document Classification: Analysis and Experimental Results
    • p
    • E. Han and G. Karypis, "Centroid-Based Document Classification: Analysis and Experimental Results, Principles of Data Mining and Knowledge Discovery", p. 424-431, 2000.
    • (2000) Principles of Data Mining and Knowledge Discovery , pp. 424-431
    • Han, E.1    Karypis, G.2
  • 43
    • 72349084932 scopus 로고    scopus 로고
    • April 2004
    • Microsoft, "http://www.microsoft.com/mscorp/twc/privacy/spam", April 2004.
  • 44
    • 72349094067 scopus 로고    scopus 로고
    • Dec 2004
    • Netcraft, "http://toolbar.netcraft.com/", Dec 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.