메뉴 건너뛰기




Volumn 36, Issue 1, 2013, Pages 324-335

A multi-tier phishing detection and filtering approach

Author keywords

Analyser; Machine learning; Multi tier classifier; Phishing

Indexed keywords

ANALYSER; CLASSIFICATION ALGORITHM; CLASSIFICATION MODELS; CLASSIFICATION PROCESS; CLASSIFIER ALGORITHMS; EMAIL FILTERING; EMPIRICAL PERFORMANCE; FALSE POSITIVE; GLOBAL SECURITY; INNOVATIVE METHOD; LOWER COMPLEXITY; MULTI-TIER; PHISHING; PHISHING ATTACKS; PHISHING DETECTIONS;

EID: 84870666662     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.05.009     Document Type: Article
Times cited : (111)

References (52)
  • 1
    • 67650687290 scopus 로고    scopus 로고
    • Anti Phishing Work Group [Online] Dec
    • Anti Phishing Work Group. Phishing attacks trends report. [Online] Available: 〈http://www.antiphishing.org〉 Dec. 2007.
    • (2007) Phishing Attacks Trends Report
  • 8
    • 0001345686 scopus 로고    scopus 로고
    • Context-sensitive learning methods for text categorization
    • W. Cohen, and Y. Singer Context-sensitive learning methods for text categorization ACM Transactions on Information Systems 17 2 1999 141 173
    • (1999) ACM Transactions on Information Systems , vol.17 , Issue.2 , pp. 141-173
    • Cohen, W.1    Singer, Y.2
  • 11
    • 0036567930 scopus 로고    scopus 로고
    • Support vector machines: Relevance feedback and information retrieval
    • W. Drucker, B. Shahrary, and D Gibbon Support vector machines: relevance feedback and information retrieval Information Processing and Management 38 3 2003 305 323
    • (2003) Information Processing and Management , vol.38 , Issue.3 , pp. 305-323
    • Drucker, W.1    Shahrary, B.2    Gibbon, D.3
  • 12
    • 0023710206 scopus 로고
    • Comparing the areas under two or more correlated receiver operating characteristic curves: A non-parametric approach
    • E.R. DeLong, D.M. DeLong, and D.L. Clark-Pearson Comparing the areas under two or more correlated receiver operating characteristic curves: a non-parametric approach Biometrics 44 1988 837 845
    • (1988) Biometrics , vol.44 , pp. 837-845
    • Delong, E.R.1    Delong, D.M.2    Clark-Pearson, D.L.3
  • 14
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
    • Anthony Y. Fu, Liu Wenyin, and Xiaotie Deng Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD) IEEE Transactions on Dependable and Secure Computing 3 4 2006 301 311
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Wenyin, L.2    Deng, X.3
  • 16
    • 17044405923 scopus 로고    scopus 로고
    • Toward integrating feature selection Algorithms for Classification and Clustering
    • L. Huan, and Y. Lei Toward integrating feature selection Algorithms for Classification and Clustering IEEE Transaction on Knowledge and Data Engg 17 4 2005
    • (2005) IEEE Transaction on Knowledge and Data Engg , vol.17 , Issue.4
    • Huan, L.1    Lei, Y.2
  • 19
  • 25
    • 33750094361 scopus 로고    scopus 로고
    • Protecting users against phishing attacks
    • E. Kirda, and C. Kruegel Protecting users against phishing attacks The Computer Journal 49 5 2006 554 561
    • (2006) The Computer Journal , vol.49 , Issue.5 , pp. 554-561
    • Kirda, E.1    Kruegel, C.2
  • 26
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • July
    • C. Kruegel, G. Vigna, and W. Robertson A multi-model approach to the detection of web-based attacks Computer Networks 48 5 2005 717 738 July
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 27
    • 80053293428 scopus 로고    scopus 로고
    • Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
    • H. Kim, and J.H. Huh Detecting DNS-poisoning-based phishing attacks from their network performance characteristics IEEE Electronics Letters Volume 47 11 2011 656 658
    • (2011) IEEE Electronics Letters Volume , vol.47 , Issue.11 , pp. 656-658
    • Kim, H.1    Huh, J.H.2
  • 33
    • 84857624229 scopus 로고    scopus 로고
    • Anti-phishing white paper
    • Microsoft
    • Microsoft. Anti-phishing white paper. Technical report, Microsoft, 2005.
    • (2005) Technical Report, Microsoft
  • 34
    • 84870674753 scopus 로고    scopus 로고
    • Mozilla
    • Mozilla. Phishing protection, 2007. 〈http://www.mozilla.com/en-US/ firefox/phishing-protection/〉.
    • (2007) Phishing Protection
  • 36
    • 84858714671 scopus 로고    scopus 로고
    • Controlling spam and spear phishing via peered network overlays and non-repudiable traceback
    • S.W. Neville, and M. Horie Controlling spam and spear phishing via peered network overlays and non-repudiable traceback eCrime Researchers Summit (eCrime) 2011 1 13
    • (2011) ECrime Researchers Summit (ECrime) , pp. 1-13
    • Neville, S.W.1    Horie, M.2
  • 37
    • 84870691909 scopus 로고    scopus 로고
    • Netcraft
    • Netcraft, 2007. 〈http://toolbar.netcraft.com/〉.
    • (2007)
  • 39
    • 84870710214 scopus 로고    scopus 로고
    • Phishingcorpus homepage Apr. [Online]
    • Phishingcorpus homepage Apr. 2006. [Online]. Available: 〈http://monkey.org/%7Ejose/wiki/doku〉.
    • (2006)
  • 40
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. Quinlan Induction of decision trees Machine Learning 1 1986 81 106
    • (1986) Machine Learning , vol.1 , pp. 81-106
    • Quinlan, J.1
  • 41
    • 0029678894 scopus 로고    scopus 로고
    • Improved use of continuous attributes in c4.5
    • J. Quinlan Improved use of continuous attributes in c4.5 Artificial Intelligence Research 4 1996 77 90
    • (1996) Artificial Intelligence Research , vol.4 , pp. 77-90
    • Quinlan, J.1
  • 44
    • 84870691629 scopus 로고    scopus 로고
    • Spamassassin public corpus [Online]
    • Spamassassin public corpus 2006. [Online].Available: 〈http:// spamassassin.apache.org/publiccorpus/php? id=PhishingCorpus〉.
    • (2006)
  • 46
    • 72449135688 scopus 로고    scopus 로고
    • Phishing detection using classifier ensembles, eCrime Researchers Summit, 2009
    • F. Toolan, and J. Carthy Phishing detection using classifier ensembles, eCrime Researchers Summit, 2009 eCRIME '09 2009 1 9
    • (2009) ECRIME '09 , pp. 1-9
    • Toolan, F.1    Carthy, J.2
  • 48
    • 79955890012 scopus 로고    scopus 로고
    • Testing individual differences in phishing vulnerability within an integrated, information processing model
    • A. Vishwanath, T. Herath, R. Chen, J.H. Wang, and R. Rao Testing individual differences in phishing vulnerability within an integrated, information processing model Decision Support Systems 51 3 2011 576 586
    • (2011) Decision Support Systems , vol.51 , Issue.3 , pp. 576-586
    • Vishwanath, A.1    Herath, T.2    Chen, R.3    Wang, J.H.4    Rao, R.5
  • 49
    • 77953070493 scopus 로고    scopus 로고
    • Detection of phishing webpages based on visual similarity
    • L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng Detection of phishing webpages based on visual similarity Procceeding of WWW 05 2005 1060 1061
    • (2005) Procceeding of WWW , vol.5 , pp. 1060-1061
    • Wenyin, L.1    Huang, G.2    Xiaoyue, L.3    Min, Z.4    Deng, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.