메뉴 건너뛰기




Volumn 15, Issue 4, 2013, Pages 2091-2121

Phishing detection: A literature survey

Author keywords

Email classification; Phishing; Phishing detection; Security; Social engineering

Indexed keywords

EMAIL CLASSIFICATION; PHISHING; PHISHING DETECTIONS; SECURITY; SOCIAL ENGINEERING;

EID: 84888328281     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.032213.00009     Document Type: Review
Times cited : (435)

References (54)
  • 2
    • 84888340476 scopus 로고    scopus 로고
    • accessed December
    • B. Krebs, "HBGary Federal hacked by Anonymous," http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011, accessed December 2011.
    • (2011) HBGary Federal Hacked by Anonymous
    • Krebs, B.1
  • 4
    • 85006397404 scopus 로고    scopus 로고
    • Large-scale automatic classification of phishing pages
    • C. Whittaker, B. Ryner, and M. Nazif, "Large-scale automatic classification of phishing pages," in NDSS '10, 2010.
    • (2010) NDSS '10
    • Whittaker, C.1    Ryner, B.2    Nazif, M.3
  • 7
    • 79959464543 scopus 로고    scopus 로고
    • Anti-Phishing Working Group (APWG) , , accessed
    • Anti-Phishing Working Group (APWG), "Phishing activity trends report - second half 2010," http://apwg.org/reports/apwg report h2 2010.pdf, 2010, accessed
    • (2010) Phishing Activity Trends Report - Second Half 2010
  • 8
    • 80855127906 scopus 로고    scopus 로고
    • Anti-Phishing Working Group (APWG) , 2011, accessed December
    • Anti-Phishing Working Group (APWG), "Phishing activity trends report - first half 2011," http://apwg.org/reports/apwg trends report h1 2011.pdf, 2011, accessed December 2011.
    • (2011) Phishing Activity Trends Report - First Half 2011
  • 9
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group (APWG) , 2011, accessed July
    • Anti-Phishing Working Group (APWG), "Phishing activity trends report - second half 2011," http://apwg.org/reports/apwg trends report h2 2011.pdf, 2011, accessed July 2012.
    • (2012) Phishing Activity Trends Report - Second Half 2011
  • 10
    • 84888384359 scopus 로고    scopus 로고
    • 2011, accessed December
    • B. Schneier, "Details of the RSA hack," http://www.schneier. com/blog/archives/2011/08/details of the.html, 2011, accessed December 2011.
    • (2011) Details of the RSA Hack
    • Schneier, B.1
  • 11
    • 35348906237 scopus 로고    scopus 로고
    • Protecting people from phishing: The design and evaluation of an embedded training email system
    • DOI 10.1145/1240624.1240760, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2007, CHI 2007
    • P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, "Protecting people from phishing: the design and evaluation of an embedded training email system," in Proceedings of the SIGCHI conference on Human factors in computing systems, ser. CHI '07. New York, NY, USA: ACM, 2007, pp. 905-914. (Pubitemid 47581678)
    • (2007) Conference on Human Factors in Computing Systems - Proceedings , pp. 905-914
    • Kumaraguru, P.1    Rhee, Y.2    Acquisti, A.3    Cranor, L.F.4    Hong, J.5    Nunge, E.6
  • 14
    • 84857483221 scopus 로고    scopus 로고
    • accessed March
    • G. Gaffney, "The myth of the stupid user," http://www. infodesign.com.au/articles/themythofthestupiduser, accessed March 2011.
    • (2011) The Myth of the Stupid User
    • Gaffney, G.1
  • 15
    • 64549084442 scopus 로고    scopus 로고
    • Natural-language processing for intrusion detection
    • dec.
    • A. Stone, "Natural-language processing for intrusion detection," Computer, vol. 40, no. 12, pp. 103-105, dec. 2007.
    • (2007) Computer , vol.40 , Issue.12 , pp. 103-105
    • Stone, A.1
  • 17
    • 60649094724 scopus 로고    scopus 로고
    • Anti-phishing in offense and defense
    • 2008. ACSAC 2008. Annual, 8-12
    • C. Yue and H. Wang, "Anti-phishing in offense and defense," in Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 8-12 2008, pp. 345-354.
    • (2008) Computer Security Applications Conference , pp. 345-354
    • Yue, C.1    Wang, H.2
  • 18
    • 72449140001 scopus 로고    scopus 로고
    • Humboldt: A distributed phishing disruption system
    • P. Knickerbocker, D. Yu, and J. Li, "Humboldt: A distributed phishing disruption system," in eCrime Researchers Summit, 2009, pp. 1-12.
    • (2009) ECrime Researchers Summit , pp. 1-12
    • Knickerbocker, P.1    Yu, D.2    Li, J.3
  • 24
    • 33745867321 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
    • M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?" in Proceedings of the SIGCHI conference on Human Factors in computing systems, ser. CHI '06, New York, NY, USA, 2006, pp. 601-610. (Pubitemid 44032148)
    • (2006) Conference on Human Factors in Computing Systems - Proceedings , vol.1 , pp. 601-610
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 26
    • 84863473237 scopus 로고    scopus 로고
    • accessed Oct
    • Google, "Google safe browsing API," http://code.google.com/ apis/safebrowsing/, accessed Oct 2011.
    • (2011) Google Safe Browsing API
  • 27
    • 84888336871 scopus 로고    scopus 로고
    • accessed Oct
    • Google, "Protocolv2Spec," http://code.google.com/p/google- safebrowsing/ wiki/Protocolv2Spec, accessed Oct 2011.
    • (2011) Protocolv2Spec
  • 33
    • 54249120074 scopus 로고    scopus 로고
    • Phishwish: A stateless phishing filter using minimal rules
    • G. Tsudik, Ed. Berlin, Heidelberg: Springer-Verlag
    • D. L. Cook, V. K. Gurbani, and M. Daniluk, "Phishwish: A stateless phishing filter using minimal rules," in Financial Cryptography and Data Security, G. Tsudik, Ed. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 182-186.
    • (2008) Financial Cryptography and Data Security , pp. 182-186
    • Cook, D.L.1    Gurbani, V.K.2    Daniluk, M.3
  • 34
    • 35348905575 scopus 로고    scopus 로고
    • Cantina: A content-based approach to detecting phishing web sites
    • DOI 10.1145/1242572.1242659, 16th International World Wide Web Conference, WWW2007
    • Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites," in Proceedings of the 16th international conference on World Wide Web, ser. WWW '07. New York, NY, USA: ACM, 2007, pp. 639-648. (Pubitemid 47582293)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 639-648
    • Zhang, Y.1    Hong, J.I.2    Cranor, L.F.3
  • 35
    • 2442493808 scopus 로고    scopus 로고
    • Robust hyperlinks and locations
    • Jul.
    • T. A. Phelps and R. Wilensky, "Robust Hyperlinks and Locations," DLib Magazine, vol. 6, no. 7/8, Jul. 2000.
    • (2000) DLib Magazine , vol.6 , Issue.7-8
    • Phelps, T.A.1    Wilensky, R.2
  • 37
    • 67349178856 scopus 로고    scopus 로고
    • Fighting phishing with discriminative keypoint features
    • may-june
    • K.-T. Chen, J.-Y. Chen, C.-R. Huang, and C.-S. Chen, "Fighting phishing with discriminative keypoint features," Internet Computing, IEEE, vol. 13, no. 3, pp. 56-63, may-june 2009.
    • (2009) Internet Computing, IEEE , vol.13 , Issue.3 , pp. 56-63
    • Chen, K.-T.1    Chen, J.-Y.2    Huang, C.-R.3    Chen, C.-S.4
  • 38
    • 45549085533 scopus 로고    scopus 로고
    • Contrast context histograman efficient discriminating local descriptor for object recognition and image matching
    • October
    • C.-R. Huang, C.-S. Chen, and P.-C. Chung, "Contrast context histograman efficient discriminating local descriptor for object recognition and image matching," Pattern Recogn., vol. 41, pp. 3071-3077, October 2008.
    • (2008) Pattern Recogn. , vol.41 , pp. 3071-3077
    • Huang, C.-R.1    Chen, C.-S.2    Chung, P.-C.3
  • 41
    • 80053293428 scopus 로고    scopus 로고
    • Detecting dns-poisoning-based phishing attacks from their network performance characteristics
    • H. Kim and J. Huh, "Detecting dns-poisoning-based phishing attacks from their network performance characteristics," Electronics Letters, vol. 47, no. 11, pp. 656-658, 26 2011.
    • (2011) Electronics Letters , vol.47 , Issue.11 , pp. 656-658
    • Kim, H.1    Huh, J.2
  • 42
    • 80053634991 scopus 로고    scopus 로고
    • Textual and visual contentbased anti-phishing: A bayesian approach
    • oct.
    • H. Zhang, G. Liu, T. Chow, and W. Liu, "Textual and visual contentbased anti-phishing: A bayesian approach," IEEE Transactions on Neural Networks, vol. 22, no. 10, pp. 1532-1546, oct. 2011.
    • (2011) IEEE Transactions on Neural Networks , vol.22 , Issue.10 , pp. 1532-1546
    • Zhang, H.1    Liu, G.2    Chow, T.3    Liu, W.4
  • 43
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
    • DOI 10.1109/TDSC.2006.50
    • A. Y. Fu, L. Wenyin, and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (emd)," IEEE Trans. Dependable Secur. Comput., vol. 3, no. 4, pp. 301-311, Oct. 2006. (Pubitemid 44837033)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Liu, W.2    Deng, X.3
  • 47
    • 72449135688 scopus 로고    scopus 로고
    • Phishing detection using classifier ensembles
    • 2009. eCRIME '09., 20 2009-oct. 21
    • F. Toolan and J. Carthy, "Phishing detection using classifier ensembles," in eCrime Researchers Summit, 2009. eCRIME '09., 20 2009-oct. 21 2009, pp. 1-9.
    • (2009) ECrime Researchers Summit , pp. 1-9
    • Toolan, F.1    Carthy, J.2
  • 50
    • 84888375986 scopus 로고    scopus 로고
    • accessed March
    • "Avoiding getting hooked by phishers," http://www.fraud.org/ tips/internet/phishing.htm, accessed March 2011.
    • (2011) Avoiding Getting Hooked by Phishers
  • 51
    • 36849073159 scopus 로고    scopus 로고
    • Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
    • DOI 10.1145/1280680.1280692, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
    • S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, "Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish," in Proceedings of the 3rd symposium on Usable privacy and security, ser. SOUPS '07. New York, NY, USA: ACM, 2007, pp. 88-99. (Pubitemid 350229382)
    • (2007) ACM International Conference Proceeding Series , vol.229 , pp. 88-99
    • Sheng, S.1    Magnien, B.2    Kumaraguru, P.3    Acquisti, A.4    Cranor, L.F.5    Hong, J.6    Nunge, E.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.