메뉴 건너뛰기




Volumn 11, Issue 4, 2014, Pages 458-471

Phish storm: Detecting phishing with streaming analytics

Author keywords

Big Data; Machine Learning; Mining and Statistical Methods; Phishing Detection; Search Engine Query Data; Security Management; STORM; URL Rating; Word Relatedness

Indexed keywords

ARTIFICIAL INTELLIGENCE; BIG DATA; CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; DATA STRUCTURES; FILTRATION; HTTP; INTERNET; LEARNING SYSTEMS; STORMS;

EID: 84919932072     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2014.2377295     Document Type: Article
Times cited : (186)

References (48)
  • 2
    • 79551532513 scopus 로고    scopus 로고
    • Javelin Strategy & Research, Pleasanton, CA, USA, Tech. Rep.
    • "2010 Identity Fraud Survey Report, " Javelin Strategy & Research, Pleasanton, CA, USA, Tech. Rep., 2010.
    • (2010) 2010 Identity Fraud Survey Report
  • 4
    • 80052998524 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 1H2014
    • "Global phishing survey: Trends and domain name use, " Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 1H2014, 2014.
    • (2014) Global Phishing Survey: Trends and Domain Name Use
  • 5
    • 77957665182 scopus 로고    scopus 로고
    • ICANN Security and Stability Advisory Committee, Los Angeles, CA, USA, Tech. Rep. SAC 025
    • "SSAC advisory on fast flux hosting and DNS, " ICANN Security and Stability Advisory Committee, Los Angeles, CA, USA, Tech. Rep. SAC 025, 2008.
    • (2008) SSAC Advisory on Fast Flux Hosting and DNS
  • 6
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 2nd Quarter 2014
    • "Phishing Activity Trends Report, " Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 2nd Quarter 2014, 2014.
    • (2014) Phishing Activity Trends Report
  • 7
    • 84936824188 scopus 로고
    • Word association norms, mutual information, and lexicography
    • Mar.
    • K. W. Church and P. Hanks, "Word association norms, mutual information, and lexicography, " Comput. Linguistics, vol. 16, no. 1, pp. 22-29, Mar. 1990.
    • (1990) Comput. Linguistics , vol.16 , Issue.1 , pp. 22-29
    • Church, K.W.1    Hanks, P.2
  • 8
    • 33847710337 scopus 로고    scopus 로고
    • The Google similarity distance
    • Mar.
    • R. L. Cilibrasi and P. M. Vitanyi, "The Google similarity distance, " Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 370-383, Mar. 2007.
    • (2007) Trans. Knowl. Data Eng. , vol.19 , Issue.3 , pp. 370-383
    • Cilibrasi, R.L.1    Vitanyi, P.M.2
  • 9
    • 84885001189 scopus 로고    scopus 로고
    • Disco: A multilingual database of distributionally similar words
    • P. Kolb, "Disco: A multilingual database of distributionally similar words, " in Proc. KONVENS, 2008, pp. 33-44.
    • (2008) Proc. KONVENS , pp. 33-44
    • Kolb, P.1
  • 10
    • 84976702763 scopus 로고
    • WordNet: A lexical database for English
    • Nov.
    • G. A. Miller, "WordNet: A lexical database for English, " Commun. ACM, vol. 38, no. 11, pp. 39-41, Nov. 1995.
    • (1995) Commun. ACM , vol.38 , Issue.11 , pp. 39-41
    • Miller, G.A.1
  • 14
    • 85029359239 scopus 로고
    • Development of the domain name system
    • P. Mockapetris and K. Dunlap, "Development of the domain name system, " in Proc. ACM SIGCOMM, 1988, pp. 123-133.
    • (1988) Proc. ACM SIGCOMM , pp. 123-133
    • Mockapetris, P.1    Dunlap, K.2
  • 18
    • 0000600219 scopus 로고    scopus 로고
    • A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge
    • Apr.
    • T. K. Landauer and S. T. Dumais, "A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge, " Psychological Rev., vol. 104, no. 2, pp. 211-240, Apr. 1997.
    • (1997) Psychological Rev. , vol.104 , Issue.2 , pp. 211-240
    • Landauer, T.K.1    Dumais, S.T.2
  • 19
    • 84948177273 scopus 로고    scopus 로고
    • Mining the web for synonyms: PMI-IR versus LSA on TOEFL
    • Springer
    • P. Turney, "Mining the web for synonyms: PMI-IR versus LSA on TOEFL, " in Proc. 12th Eur. Conf. Mach. Learn., 2001, pp. 491-502, Springer.
    • (2001) Proc. 12th Eur. Conf. Mach. Learn. , pp. 491-502
    • Turney, P.1
  • 20
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Jul.
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 22
    • 84857472534 scopus 로고    scopus 로고
    • Lexical URL analysis for discriminating phishing and legitimate e-mail messages
    • M. Khonji, Y. Iraqi, and A. Jones, "Lexical URL analysis for discriminating phishing and legitimate e-mail messages, " in Proc. ICITST, 2011, pp. 422-427.
    • (2011) Proc. ICITST , pp. 422-427
    • Khonji, M.1    Iraqi, Y.2    Jones, A.3
  • 25
    • 77953329477 scopus 로고    scopus 로고
    • PhishNet: Predictive blacklisting to detect phishing attacks
    • P. Prakash, M. Kumar, R. Kompella, and M. Gupta, "PhishNet: Predictive blacklisting to detect phishing attacks, " in Proc. IEEE INFOCOM, 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Prakash, P.1    Kumar, M.2    Kompella, R.3    Gupta, M.4
  • 26
    • 78650804323 scopus 로고    scopus 로고
    • Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement
    • Jun.
    • G. Forman and M. Scholz, "Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement, " SIGKDD Exploration Newslett., vol. 12, no. 1, pp. 49-57, Jun. 2010.
    • (2010) SIGKDD Exploration Newslett. , vol.12 , Issue.1 , pp. 49-57
    • Forman, G.1    Scholz, M.2
  • 27
    • 76749092270 scopus 로고    scopus 로고
    • The WEKA data mining software: An update
    • Jun.
    • M. Hall et al., "The WEKA data mining software: An update, " ACM SIGKDD Explorations Newslett., vol. 11, no. 1, pp. 10-18, Jun. 2009.
    • (2009) ACM SIGKDD Explorations Newslett. , vol.11 , Issue.1 , pp. 10-18
    • Hall, M.1
  • 28
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • Oct.
    • L. Breiman, "Random forests, " Mach. Learn., vol. 45, no. 1, pp. 5-32, Oct. 2001.
    • (2001) Mach. Learn. , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 29
    • 84867774439 scopus 로고    scopus 로고
    • Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
    • Oct.
    • S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, "Detecting algorithmically generated domain-flux attacks with DNS traffic analysis, " IEEE/ACM Trans. Netw., vol. 20, no. 5, pp. 1663-1677, Oct. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.5 , pp. 1663-1677
    • Yadav, S.1    Reddy, A.K.K.2    Reddy, A.N.3    Ranjan, S.4
  • 30
    • 77953636660 scopus 로고    scopus 로고
    • Detecting visually similar web pages: Application to phishing detection
    • May
    • T.-C. Chen, S. Dick, and J. Miller, "Detecting visually similar web pages: Application to phishing detection, " ACM Trans. Internet Technol., vol. 10, no. 2, pp. 1-38, May 2010.
    • (2010) ACM Trans. Internet Technol. , vol.10 , Issue.2 , pp. 1-38
    • Chen, T.-C.1    Dick, S.2    Miller, J.3
  • 32
    • 84865616735 scopus 로고    scopus 로고
    • A hybrid phish detection approach by identity discovery and keywords retrieval
    • ACM
    • G. Xiang and J. I. Hong, "A hybrid phish detection approach by identity discovery and keywords retrieval, " in Proc. 18th Int. Conf. World Wide We b, 2009, pp. 571-580, ACM.
    • (2009) Proc. 18th Int. Conf. World Wide Web , pp. 571-580
    • Xiang, G.1    Hong, J.I.2
  • 33
    • 35348905575 scopus 로고    scopus 로고
    • Cantina: A content-based approach to detecting phishing web sites
    • ACM
    • Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: A content-based approach to detecting phishing web sites, " in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 639-648, ACM.
    • (2007) Proc. 16th Int. Conf. World Wide Web , pp. 639-648
    • Zhang, Y.1    Hong, J.I.2    Cranor, L.F.3
  • 34
    • 84900297126 scopus 로고    scopus 로고
    • An anti-phishing system employing diffused information
    • Apr.
    • T.-C. Chen, T. Stepan, S. Dick, and J. Miller, "An anti-phishing system employing diffused information, " ACM Trans. Inf. Syst. Security, vol. 16, no. 4, pp. 1-31, Apr. 2014.
    • (2014) ACM Trans. Inf. Syst. Security , vol.16 , Issue.4 , pp. 1-31
    • Chen, T.-C.1    Stepan, T.2    Dick, S.3    Miller, J.4
  • 39
    • 84909631007 scopus 로고    scopus 로고
    • Intelligent phish-ing detection parameter framework for e-banking transactions based on neuro-fuzzy
    • P. Barraclough, G. Sexton, M. Hossain, and N. Aslam, "Intelligent phish-ing detection parameter framework for e-banking transactions based on neuro-fuzzy, " in Proc. SAI, 2014, pp. 545-555.
    • (2014) Proc. SAI , pp. 545-555
    • Barraclough, P.1    Sexton, G.2    Hossain, M.3    Aslam, N.4
  • 40
    • 84862993100 scopus 로고    scopus 로고
    • Parsing and detecting phishing pages based on semantic understanding of text
    • J. Zhang et al., "Parsing and detecting phishing pages based on semantic understanding of text, " J. Inf. & Comput. Sci., vol. 9, no. 6, pp. 1521-1534, 2012.
    • (2012) J. Inf. & Comput. Sci. , vol.9 , Issue.6 , pp. 1521-1534
    • Zhang, J.1
  • 41
    • 84874664509 scopus 로고    scopus 로고
    • PhishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
    • Mar.
    • V. Ramanathan and H. Wechsler, "phishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training, " EURASIP J. Multimedia Inf. Security, vol. 2012, no. 1, pp. 1-22, Mar. 2012.
    • (2012) EURASIP J. Multimedia Inf. Security , vol.2012 , Issue.1 , pp. 1-22
    • Ramanathan, V.1    Wechsler, H.2
  • 43
    • 84875605043 scopus 로고    scopus 로고
    • PhishLive: A view of phishing and malware attacks from an edge router
    • Springer-Verlag
    • L. Cao, T. Probst, and R. Kompella, "PhishLive: A view of phishing and malware attacks from an edge router, " in Proc. 14th Int. Conf. Passive Active Meas.-PAM, 2013, pp. 239-249, Springer-Verlag.
    • (2013) Proc. 14th Int. Conf. Passive Active Meas.-PAM , pp. 239-249
    • Cao, L.1    Probst, T.2    Kompella, R.3
  • 45
    • 84873585431 scopus 로고    scopus 로고
    • Survey on web spam detection: Principles and algorithms
    • Dec.
    • N. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms, " SIGKDD Exploration Newslett., vol. 13, no. 2, pp. 50-64, Dec. 2012.
    • (2012) SIGKDD Exploration Newslett. , vol.13 , Issue.2 , pp. 50-64
    • Spirin, N.1    Han, J.2
  • 47
    • 60549098239 scopus 로고    scopus 로고
    • Detecting influenza epidemics using search engine query data
    • J. Ginsberg et al., "Detecting influenza epidemics using search engine query data, " Nature, vol. 457, no. 7232, pp. 1012-1014, 2008.
    • (2008) Nature , vol.457 , Issue.7232 , pp. 1012-1014
    • Ginsberg, J.1
  • 48
    • 84871191904 scopus 로고    scopus 로고
    • Detecting and tracking topics and events from web search logs
    • Nov.
    • H. Liu, J. He, Y. Gu, H. Xiong, and X. Du, "Detecting and tracking topics and events from web search logs, " ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 21:1-21:29, Nov. 2012.
    • (2012) ACM Trans. Inf. Syst. , vol.30 , Issue.4 , pp. 2101-2129
    • Liu, H.1    He, J.2    Gu, Y.3    Xiong, H.4    Du, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.