메뉴 건너뛰기




Volumn , Issue , 2011, Pages 422-427

Lexical URL analysis for discriminating phishing and legitimate e-mail messages

Author keywords

emails; lexical analysis; phishing attacks; URLs

Indexed keywords

ANALYSIS APPROACH; ANTI-PHISHING; CLASSIFICATION ACCURACY; EMAIL CLASSIFICATION; EMAIL MESSAGES; EMAILS; LEXICAL ANALYSIS; MALWARES; PHISHING; PHISHING ATTACKS;

EID: 84857472534     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 34548344520 scopus 로고    scopus 로고
    • A.-P. W. G. (APWG), 3rd Quarter
    • A.-P. W. G. (APWG), "Phishing activity trends report," http://www.antiphishing.org/reports/apwg-report-Q3-2009.pdf, 3rd Quarter 2009.
    • (2009) Phishing Activity Trends Report
  • 2
    • 84857479064 scopus 로고    scopus 로고
    • accessed January 2011
    • "Trojan.Spyeye j symantec," http://www.symantec.com/security response/ writeup.jsp?docid=2010-020216-0135-99, accessed January 2011.
    • Trojan.Spyeye J Symantec
  • 4
    • 84857483221 scopus 로고    scopus 로고
    • accessed March 2011
    • G. Gaffney, "The myth of the stupid user," http://www. infodesign.com.au/articles/themythofthestupiduser, accessed March 2011.
    • The Myth of the Stupid User
    • Gaffney, G.1
  • 5
    • 80053641138 scopus 로고    scopus 로고
    • Lexical url analysis for discriminating phishing and legitimate websites
    • Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. New York, NY, USA: ACM, Online. Available
    • M. Khonji, Y. Iraqi, and A. Jones, "Lexical url analysis for discriminating phishing and legitimate websites," in Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. CEAS '11. New York, NY, USA: ACM, 2011, pp. 109-115. [Online]. Available: http://doi.acm.org/10.1145/2030376.2030389
    • (2011) CEAS '11 , pp. 109-115
    • Khonji, M.1    Iraqi, Y.2    Jones, A.3
  • 7
    • 35348913799 scopus 로고    scopus 로고
    • Learning to detect phishing emails
    • Proceedings of the 16th international conference on World Wide Web, ser. New York, NY, USA: ACM, Online. Available
    • I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails,"in Proceedings of the 16th international conference on World Wide Web, ser. WWW '07. New York, NY, USA: ACM, 2007, pp. 649-656. [Online]. Available: http://doi.acm.org/10.1145/1242572.1242660
    • (2007) WWW '07 , pp. 649-656
    • Fette, I.1    Sadeh, N.2    Tomasic, A.3
  • 8
    • 80053654928 scopus 로고    scopus 로고
    • accessed July 2010.
    • J. Nazario, "Phishing corpus," http://monkey.org/~jose/wiki/ doku.php?id=phishingcorpus, accessed July 2010.
    • Phishing Corpus
    • Nazario, J.1
  • 9
    • 84928124564 scopus 로고    scopus 로고
    • accessed January 2011. [Online]. Available: http://spamassassin.apache. org/publiccorpus
    • SpamAssassin, "Public corpus," http://spamassassin.apache.org/ publiccorpus/, accessed January 2011. [Online]. Available: http://spamassassin. apache.org/publiccorpus/
    • Public Corpus
  • 10
    • 71749098791 scopus 로고    scopus 로고
    • New filtering approaches for phishing email
    • January Online. Available
    • A. Bergholz, J. De Beer, S. Glahn, M.-F. Moens, G. Paaß, and S. Strobel, "New filtering approaches for phishing email," J. Comput. Secur., vol. 18, pp. 7-35, January 2010. [Online]. Available: http://portal.acm.org/citation.cfm?id=1734234.1734239
    • (2010) J. Comput. Secur. , vol.18 , pp. 7-35
    • Bergholz, A.1    De Beer, J.2    Glahn, S.3    Moens, M.-F.4    Paaß, G.5    Strobel, S.6
  • 13
    • 80053639164 scopus 로고    scopus 로고
    • A study of feature subset evaluators and feature subset searching methods for phishing classification
    • Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. New York, NY, USA: ACM, Online. Available
    • M. Khonji, A. Jones, and Y. Iraqi, "A study of feature subset evaluators and feature subset searching methods for phishing classification," in Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. CEAS '11. New York, NY, USA: ACM, 2011, pp. 135-144. [Online]. Available: http://doi.acm.org/10.1145/2030376. 2030392
    • (2011) CEAS '11 , pp. 135-144
    • Khonji, M.1    Jones, A.2    Iraqi, Y.3
  • 14
    • 72449167296 scopus 로고    scopus 로고
    • A comparison of machine learning techniques for phishing detection
    • Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. New York, NY, USA: ACM, Online. Available
    • S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. eCrime '07. New York, NY, USA: ACM, 2007, pp. 60-69. [Online]. Available: http://doi.acm.org/10.1145/1299015.1299021
    • (2007) ECrime '07 , pp. 60-69
    • Abu-Nimeh, S.1    Nappa, D.2    Wang, X.3    Nair, S.4
  • 15
    • 79952520242 scopus 로고    scopus 로고
    • Feature selection for spam and phishing detection
    • eCrime Researchers Summit (eCrime), 2010, ser. Dallas, TX
    • F. Toolan and J. Carthy, "Feature selection for spam and phishing detection," in eCrime Researchers Summit (eCrime), 2010, ser. eCrime '10, Dallas, TX, 2010.
    • (2010) ECrime '10
    • Toolan, F.1    Carthy, J.2
  • 16
    • 67650695614 scopus 로고    scopus 로고
    • E-mail classification for phishing defense
    • Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval, ser. Berlin, Heidelberg: Springer-Verlag, Online. Available
    • W. N. Gansterer and D. Pölz, "E-mail classification for phishing defense," in Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval, ser. ECIR '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 449-460. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-00958-7 40
    • (2009) ECIR '09 , pp. 449-460
    • Gansterer, W.N.1    Pölz, D.2
  • 18
    • 70350685126 scopus 로고    scopus 로고
    • Introduction to machine learning
    • December
    • E. Alpaydin, "Introduction to machine learning," Knowl. Eng. Rev., vol. 20, pp. 432-433, December 2005.
    • (2005) Knowl. Eng. Rev. , vol.20 , pp. 432-433
    • Alpaydin, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.