메뉴 건너뛰기




Volumn 2012, Issue , 2012, Pages

PhishGILLNET-phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training

Author keywords

Boosting; Co training; Identity theft; Machine learning; Natural language processing; Phishing; Probabilistic latent semantic analysis

Indexed keywords

ADAPTIVE BOOSTING; CLASSIFICATION (OF INFORMATION); CRIME; ELECTRONIC MAIL; LEARNING SYSTEMS; NATURAL LANGUAGE PROCESSING SYSTEMS; PROBABILITY DISTRIBUTIONS; PROFITABILITY; SEMANTICS;

EID: 84874664509     PISSN: 16874161     EISSN: 2510523X     Source Type: Journal    
DOI: 10.1186/1687-417X-2012-1     Document Type: Article
Times cited : (62)

References (74)
  • 1
    • 84875139055 scopus 로고    scopus 로고
    • National Data-Deter. Detect. Defend. Avoid ID Theft, Accessed 21 July 2011
    • National Data-Deter. Detect. Defend. Avoid ID Theft.http://www.ftc.gov/ bcp/edu/microsites/idtheft/reference-desk/national-data.html. Accessed 21 July 2011
  • 2
    • 84875199285 scopus 로고    scopus 로고
    • Google Says Phishers Stole E-mail From US Officials, Others, PCWorld Business Center, Accessed 21 July 2011
    • Google Says Phishers Stole E-mail From US Officials, Others, PCWorld Business Center.http://www.pcworld.com/businesscenter/article/229202/google- says-phishers-stole-email-from-us-officials-others.html. Accessed 21 July 2011
  • 3
    • 84875176989 scopus 로고    scopus 로고
    • DNSBL Information-Spam Database Lookup, Accessed 21 July 2011
    • DNSBL Information-Spam Database Lookup.http://www.dnsbl.info/. Accessed 21 July 2011
  • 4
    • 84875130941 scopus 로고    scopus 로고
    • Snort-Home Page, Accessed 21 July 2011
    • Snort-Home Page.http://www.snort.org/. Accessed 21 July 2011
  • 5
    • 80053293428 scopus 로고    scopus 로고
    • Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
    • doi:10.1049/el.2011.0399
    • H Kim, JH Huh, Detecting DNS-poisoning-based phishing attacks from their network performance characteristics. Electron Lett. 47(11):656-658 (2011). doi:10.1049/el.2011.0399
    • (2011) Electron Lett , vol.47 , Issue.11 , pp. 656-658
    • Kim, H.1    Huh, J.H.2
  • 6
    • 84875200545 scopus 로고    scopus 로고
    • ID Sender, Accessed 21 July 2011
    • ID Sender, http://www.microsoft.com/mscorp/safety/technologies/senderid/ default.mspx. Accessed 21 July 2011
  • 7
    • 84875133083 scopus 로고    scopus 로고
    • DomainKey Library and Implementor's Tools, Accessed 21 July 2011
    • DomainKey Library and Implementor's Tools.http://domainkeys.sourceforge. net/. Accessed 21 July 2011
  • 8
    • 21844475661 scopus 로고    scopus 로고
    • Dimension reduction in text classification with support vector machines
    • H Kim, P Howland, H Park, Dimension reduction in text classification with support vector machines. J Mach Learn Res. 6, 37-53 (2005)
    • (2005) J Mach Learn Res , vol.6 , pp. 37-53
    • Kim, H.1    Howland, P.2    Park, H.3
  • 9
    • 84875140413 scopus 로고    scopus 로고
    • SpamAssassin: Welcome to SpamAssassin, Accessed 19 July 2011
    • SpamAssassin: Welcome to SpamAssassin.http://spamassassin.apache.org/. Accessed 19 July 2011
  • 10
    • 35348913799 scopus 로고    scopus 로고
    • Learning to detect phishing emails
    • DOI 10.1145/1242572.1242660, 16th International World Wide Web Conference, WWW2007
    • I Fette, N Sadeh, A Tomasic, Learning to detect phishing emails. in Proceedings of the 16th international conference on World Wide Web, vol. 1. (Banff, AB, Canada, 2007), pp. 649-656 (Pubitemid 47582294)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 649-656
    • Fette, I.1    Sadeh, N.2    Tomasic, A.3
  • 11
    • 49049098349 scopus 로고    scopus 로고
    • A comparison of machine learning techniques for phishing detection
    • Pittsburgh, PA, USA
    • S Abu-Nimeh, D Nappa, X Wang, S Nair, A comparison of machine learning techniques for phishing detection. in Proceedings of the eCrime Researchers Summit, vol. 1. (Pittsburgh, PA, USA, 2007), pp. 60-69
    • (2007) Proceedings of the ECrime Researchers Summit , vol.1 , pp. 60-69
    • Abu-Nimeh, S.1    Nappa, D.2    Wang, X.3    Nair, S.4
  • 12
    • 70449493351 scopus 로고    scopus 로고
    • Distributed phishing detection by applying variable selection using bayesian additive regression trees
    • Dresden, Germany
    • S Abu-Nimeh, D Nappa, X Wang, S Nair, Distributed phishing detection by applying variable selection using Bayesian additive regression trees. in IEEE International Conference on Communications, vol. 1. (Dresden, Germany, 2009), pp. 1-5
    • (2009) IEEE International Conference on Communications , vol.1 , pp. 1-5
    • Abu-Nimeh, S.1    Nappa, D.2    Wang, X.3    Nair, S.4
  • 19
    • 79952520242 scopus 로고    scopus 로고
    • Feature selection for spam and phishing detection
    • Dallas, Texas, USA
    • F Toolan, J Carthy, Feature Selection for Spam and Phishing Detection. in eCrime Researchers Summit, vol. 1. (Dallas, Texas, USA, 2010), pp. 1-12
    • (2010) ECrime Researchers Summit , vol.1 , pp. 1-12
    • Toolan, F.1    Carthy, J.2
  • 21
  • 22
  • 23
    • 84893432052 scopus 로고    scopus 로고
    • Profiling phishing activity based on hyperlinks extracted from phishing emails
    • J Yearwood, M Mammadov, D Webb, Profiling phishing activity based on hyperlinks extracted from phishing emails. J Social Netw Anal Mining. 2(1):5-16 (2011)
    • (2011) J Social Netw Anal Mining. , vol.2 , Issue.1 , pp. 5-16
    • Yearwood, J.1    Mammadov, M.2    Webb, D.3
  • 24
    • 81855218311 scopus 로고    scopus 로고
    • A feature-rich machine learning framework for detecting phishing web sites
    • Article 21
    • G Xiang, J Hong, CP Rose, L Cranor, A feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur 14(2):1-28 (2011). Article 21
    • (2011) ACM Trans Inf Syst Secur , vol.14 , Issue.2 , pp. 1-28
    • Xiang, G.1    Hong, J.2    Rose, C.P.3    Cranor, L.4
  • 26
    • 80053634991 scopus 로고    scopus 로고
    • Textual and visual content-based anti-phishing: A Bayesian approach
    • H Zhang, G Liu, TWS Chow, W Liu, Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Trans Neural Netw. 22(10):1532-1546 (2011)
    • (2011) IEEE Trans Neural Netw , vol.22 , Issue.10 , pp. 1532-1546
    • Zhang, H.1    Liu, G.2    Chow, T.3    Liu, W.4
  • 28
    • 79958010910 scopus 로고    scopus 로고
    • A novel phishing classification based on url features
    • Dubai, UAE
    • M Khonji, A Jones, Y Iraqi, A novel phishing classification based on URL features. in IEEE GCC Conference and Exhibition, vol. 1. (Dubai, UAE, 2011), pp. 221-224
    • (2011) IEEE GCC Conference and Exhibition , vol.1 , pp. 221-224
    • Khonji, M.1    Jones, A.2    Iraqi, Y.3
  • 29
    • 84863287779 scopus 로고    scopus 로고
    • Anti-phishing through phishing target discovery
    • L Wenyin, G Liu, B Qiu, X Quan, Anti-phishing through phishing target discovery. IEEE J Internet Comput. 16(2):52-61 (2011)
    • (2011) IEEE J Internet Comput , vol.16 , Issue.2 , pp. 52-61
    • Wenyin, L.1    Liu, G.2    Qiu, B.3    Quan, X.4
  • 30
    • 84875168592 scopus 로고    scopus 로고
    • SpoofGuard, Accessed 21 July 2011
    • SpoofGuard.http://crypto.stanford.edu/SpoofGuard/. Accessed 21 July 2011
  • 32
    • 84875154165 scopus 로고    scopus 로고
    • CallingID-Your Protection from Identity Theft, Fraud, Scams and Malware, Accessed 21 July 2011
    • CallingID-Your Protection from Identity Theft, Fraud, Scams and Malware. http://www.callingid.com/Default.aspx. Accessed 21 July 2011
  • 33
    • 84875196742 scopus 로고    scopus 로고
    • CloudMark, Accessed 26 July 2011
    • CloudMark.http://www.cloudmark.com/en/products/cloudmark-desktopone/ index. Accessed 26 July 2011
  • 34
    • 84875146707 scopus 로고    scopus 로고
    • Netcraft Anti-Phishing Toolbar, Accessed 26 July 2011
    • Netcraft Anti-Phishing Toolbar.http://toolbar.netcraft.com/. Accessed 26 July 2011
  • 35
    • 84875185392 scopus 로고    scopus 로고
    • FirePhish, Accessed 26 July 2011
    • FirePhish, https://addons.mozilla.org/en-US/firefox/addon/firephish-anti- phishing-extens/. Accessed 26 July 2011
  • 36
    • 84875190168 scopus 로고    scopus 로고
    • eBay Toolbar, Accessed 21 July 2011
    • eBay Toolbar.http://download.cnet.com/eBay-Toolbar/3000-12512-4-10153544. html?tag=contentMain;downloadLinks. Accessed 21 July 2011
  • 37
    • 84875202207 scopus 로고    scopus 로고
    • IE Phishing Filter, Accessed 21 July 2011
    • IE Phishing Filter.http://support.microsoft.com/kb/930168. Accessed 21 July 2011
  • 38
    • 78049396315 scopus 로고    scopus 로고
    • Bypassing security toolbars and phishing filters via DNS poisoning
    • New Orleans, Louisiana, USA
    • S Ab-Nimeh, S Nair, Bypassing security toolbars and phishing filters via DNS poisoning. in IEEE Global Telecommunications Conference, vol. 1. (New Orleans, Louisiana, USA, 2008), pp. 1-6
    • (2008) IEEE Global Telecommunications Conference , vol.1 , pp. 1-6
    • Ab-Nimeh, S.1    Nair, S.2
  • 39
    • 84887488921 scopus 로고    scopus 로고
    • Implementing a web browser with phishing detection techniques
    • A Jain, V Richariya, Implementing a web browser with phishing detection techniques. World Comput Sci Inf Technol J. 1(7):28-291 (2011)
    • (2011) World Comput Sci Inf Technol J. , vol.1 , Issue.7 , pp. 28-291
    • Jain, A.1    Richariya, V.2
  • 43
    • 84875139841 scopus 로고    scopus 로고
    • Mail Frontier Phishing IQ Test-UK Edition, Accessed 21 July 2011
    • MailFrontier Phishing IQ Test-UK Edition.http://survey.mailfrontier.com/ survey/phishing-uk.html. Accessed 21 July 2011
  • 46
    • 80052568937 scopus 로고    scopus 로고
    • Design a mobile game for home computer users to prevent from phishing attacks
    • London, UK
    • NAG Arachchilage, M Cole, Design a mobile game for home computer users to prevent from phishing attacks. in IEEE International Conference on Information Society, vol. 1. (London, UK, 2011), pp. 485-489
    • (2011) IEEE International Conference on Information Society , vol.1 , pp. 485-489
    • Arachchilage, N.A.G.1    Cole, M.2
  • 48
    • 84861441778 scopus 로고    scopus 로고
    • The impact of public information on phishing attack and defense
    • T Moore, R Clayton, The impact of public information on phishing attack and defense. Commun Strat. 81(1):45-68 (2011)
    • (2011) Commun Strat , vol.81 , Issue.1 , pp. 45-68
    • Moore, T.1    Clayton, R.2
  • 49
    • 84875155023 scopus 로고    scopus 로고
    • Gillnet-Wikipedia, Accessed 25 July 2011
    • Gillnet-Wikipedia.http://en.wikipedia.org/wiki/Gillnet. Accessed 25 July 2011
  • 50
    • 84875136270 scopus 로고    scopus 로고
    • The Porter Stemming Algorithm, Accessed 26 July 2011
    • The Porter Stemming Algorithm.http://tartarus.org/~martin/PorterStemmer/. Accessed 26 July 2011
  • 51
    • 84875169003 scopus 로고    scopus 로고
    • WordNet, Accessed 26 July 2011
    • WordNet.http://wordnet.princeton.edu/. Accessed 26 July 2011
  • 52
    • 84875163047 scopus 로고    scopus 로고
    • Google Suggest API, Accessed 26 July 2011
    • Google Suggest API.http://code.google.com/p/google-refine/wiki/ SuggestApi. Accessed 26 July 2011
  • 53
    • 84875190208 scopus 로고    scopus 로고
    • Levenshtein distance, Accessed 26 July 2011
    • Levenshtein distance.http://en.wikipedia.org/wiki/Levenshtein-distance. Accessed 26 July 2011
  • 55
    • 0034818212 scopus 로고    scopus 로고
    • Unsupervised learning by probabilistic Latent Semantic Analysis
    • DOI 10.1023/A:1007617005950
    • T Hofmann, Unsupervised learning by probabilistic latent semantic analysis. Mach Learn. 42, 177-196 (2001). doi:10.1023/A:1007617005950 (Pubitemid 32872403)
    • (2001) Machine Learning , vol.42 , Issue.1-2 , pp. 177-196
    • Hofmann, T.1
  • 58
    • 85149612939 scopus 로고
    • Fast effective rule induction
    • Tahoe City, California, USA
    • WW Cohen, Fast effective rule induction. in 12th International Conference on Machine Learning, vol. 1. (Tahoe City, California, USA, 1995), pp. 115-123
    • (1995) 12th International Conference on Machine Learning , vol.1 , pp. 115-123
    • Cohen, W.W.1
  • 59
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • DOI 10.1023/A:1010933404324
    • L Breiman, Random forests. Mach Learn. 45(1):5-32 (2001). doi:10.1023/A:1010933404324 (Pubitemid 32933532)
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 64
    • 22944457138 scopus 로고    scopus 로고
    • Email classification with co-training
    • Toronto, Ontario, Canada
    • S Kiritchenko, S Matwin, Email classification with co-training. in Proceedings of CASCON, (ACM), vol. 1. (Toronto, Ontario, Canada, 2001), pp. 1-8
    • (2001) Proceedings of CASCON ACM , vol.1 , pp. 1-8
    • Kiritchenko, S.1    Matwin, S.2
  • 68
    • 84875183864 scopus 로고    scopus 로고
    • Spam Assassin Publiccorpus, Accessed 21 July 2011
    • SpamAssassin Publiccorpus.http://spamassassin.apache.org/publiccorpus/. Accessed 21 July 2011
  • 69
    • 84875125964 scopus 로고    scopus 로고
    • Phishing Corpus, Accessed 21 July 2011
    • PhishingCorpus.http://monkey.org/~jose/wiki/doku.php. Accessed 21 July 2011
  • 70
    • 84875176543 scopus 로고    scopus 로고
    • Enron Email Dataset, Accessed November 2011
    • Enron Email Dataset.http://www.cs.cmu.edu/~enron/. Accessed November 2011
  • 71
    • 84875178039 scopus 로고    scopus 로고
    • SPAM Archive, Accessed November 2011
    • SPAM Archive.http://untroubled.org/spam/. Accessed November 2011
  • 72
    • 84875165715 scopus 로고    scopus 로고
    • PhishTank, Accessed November 2011
    • PhishTank.http://www.phishtank.com. Accessed November 2011
  • 73
    • 84875126176 scopus 로고    scopus 로고
    • SURBL URI Reputation Data, Accessed November 2011
    • SURBL URI Reputation Data.http://www.surbl.org. Accessed November 2011
  • 74
    • 84875124055 scopus 로고    scopus 로고
    • Internet Security Threat Reports, Accessed November 2011
    • Internet Security Threat Reports.http://www.symantec.com/business/ threatreport/archive.jsp. Accessed November 2011.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.