Phishing and Spoofing Websites: Detection and Countermeasures
Abstract
Keywords
Full Text:
PDFReferences
R. Alabdan, “Phishing Attacks Survey: Types, Vectors, and Technical Approaches,†Future Internet 2020, Vol. 12, Page 168, vol. 12, no. 10, p. 168, Sep. 2020, doi: 10.3390/FI12100168.
A. K. Jain and B. B. Gupta, “A survey of phishing attack techniques, defence mechanisms and open research challenges,†Enterp Inf Syst, vol. 16, no. 4, pp. 527–565, 2021, doi: 10.1080/17517575.2021.1896786.
M. P. Bach, T. Kamenjarska, and B. Žmuk, “Targets of phishing attacks: The bigger fish to fry,†Procedia Comput Sci, vol. 204, pp. 448–455, Jan. 2022, doi: 10.1016/J.PROCS.2022.08.055.
R. S. Rao, T. Vaishnavi, and A. R. Pais, “Phishdump: a multi-model ensemble based technique for the detection of phishing sites in mobile devices,†Pervasive Mob Comput, vol. 60, p. 101084, Nov. 2019, doi: 10.1016/j.pmcj.2019.101084.
R. S. Rao, T. Vaishnavi, and A. R. Pais, “Catchphish: detection of phishing websites by inspecting urls,†J Ambient Intell Humaniz Comput, vol. 11, no. 2, pp. 813–825, Feb. 2020, doi: 10.1007/s12652-019-01311-4.
R. Di Pietro, G. Me, and M. A. Strangio, “A two-factor mobile authentication scheme for secure financial transactions,†4th Annual International Conference on Mobile Business, ICMB 2005, pp. 28–34, 2005, doi: 10.1109/ICMB.2005.12.
J. Lee, L. Bauer, and M. L. Mazurek, “The effectiveness of security images in internet banking,†IEEE Internet Comput, vol. 19, no. 1, pp. 54–62, 2015, doi: 10.1109/MIC.2014.108.
A. Safi and S. Singh, “A systematic literature review on phishing website detection techniques,†Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 2, pp. 590–611, Feb. 2023, doi: 10.1016/J.JKSUCI.2023.01.004.
T. Nathezhtha, D. Sangeetha, and V. Vaidehi, “WC-PAD: Web crawling based phishing attack detection,†Proceedings - International Carnahan Conference on Security Technology, vol. 2019-October, Oct. 2019, doi: 10.1109/CCST.2019.8888416.
R. S. Rao and A. R. Pais, “Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach,†J Ambient Intell Humaniz Comput, vol. 11, no. 9, pp. 3853–3872, Sep. 2020, doi: 10.1007/S12652-019-01637-Z/METRICS.
N. A. Azeez, S. Misra, I. A. Margaret, L. Fernandez-Sanz, and S. M. Abdulhamid, “Adopting automated whitelist approach for detecting phishing attacks,†Comput Secur, vol. 108, p. 102328, Sep. 2021, doi: 10.1016/J.COSE.2021.102328.
S. Maroofi, M. Korczynski, C. Hesselman, B. Ampeau, and A. Duda, “COMAR: Classification of Compromised versus Maliciously Registered Domains,†Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020, pp. 607–623, Sep. 2020, doi: 10.1109/EUROSP48549.2020.00045.
P. A. Barraclough, G. Fehringer, and J. Woodward, “Intelligent cyber-phishing detection for online,†Comput Secur, vol. 104, p. 102123, May 2021, doi: 10.1016/J.COSE.2020.102123.
Y. Wang, Y. Liu, T. Wu, and I. Duncan, “A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms,†International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Jun. 2020, doi: 10.1109/CYBERSECURITY49315.2020.9138873.
A. S. Bozkir and M. Aydos, “LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition,†Comput Secur, vol. 95, p. 101855, Aug. 2020, doi: 10.1016/J.COSE.2020.101855.
R. S. Rao and A. R. Pais, “Jail-Phish: An improved search engine based phishing detection system,†Comput Secur, vol. 83, pp. 246–267, Jun. 2019, doi: 10.1016/J.COSE.2019.02.011.
Y. Li, Z. Yang, X. Chen, H. Yuan, and W. Liu, “A stacking model using URL and HTML features for phishing webpage detection,†Future Generation Computer Systems, vol. 94, pp. 27–39, May 2019, doi: 10.1016/J.FUTURE.2018.11.004.
A. K. Jain and B. B. Gupta, “Two-level authentication approach to protect from phishing attacks in real time,†J Ambient Intell Humaniz Comput, vol. 9, no. 6, pp. 1783–1796, Nov. 2018, doi: 10.1007/s12652-017-0616-z.
Y. A. Alsariera, V. E. Adeyemo, A. O. Balogun, and A. K. Alazzawi, “AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites,†IEEE Access, vol. 8, pp. 142532–142542, 2020, doi: 10.1109/ACCESS.2020.3013699.
B. B. Gupta, K. Yadav, I. Razzak, K. Psannis, A. Castiglione, and X. Chang, “A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment,†Comput Commun, vol. 175, pp. 47–57, Jul. 2021, doi: 10.1016/J.COMCOM.2021.04.023.
Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for detecting phishing webpages,†Comput Secur, vol. 84, pp. 256–275, Jul. 2019, doi: 10.1016/J.COSE.2019.03.018.
M. Babagoli, M. P. Aghababa, and V. Solouk, “Heuristic nonlinear regression strategy for detecting phishing websites,†Soft comput, vol. 23, no. 12, pp. 4315–4327, Jun. 2019, doi: 10.1007/S00500-018-3084-2/METRICS.
R. S. Rao and A. R. Pais, “Detection of phishing websites using an efficient feature-based machine learning framework,†Neural Comput Appl, vol. 31, no. 8, pp. 3851–3873, Aug. 2019, doi: 10.1007/S00521-017-3305-0/METRICS.
P. Athisaya Sakila Rani, Ns. Singh, and A. Professor, “Paddy Leaf Symptom-based Disease Classification Using Deep CNN with ResNet-50,†International Journal of Advanced Science Computing and Engineering, vol. 4, no. 2, pp. 88–94, Aug. 2022, doi: 10.30630/IJASCE.4.2.83.
F. Zulfikri, D. Tryanda, A. Syarif, and H. Patria, “Predicting Peer to Peer Lending Loan Risk Using Classification Approach,†International Journal of Advanced Science Computing and Engineering, vol. 3, no. 2, pp. 94–100, Oct. 2021, doi: 10.30630/IJASCE.3.2.57.
P. Chaudhari, “Skin Cancer Classification Application Using Machine Learning,†International Journal of Data Science, vol. 2, no. 1, pp. 47–55, Sep. 2021, doi: 10.18517/IJODS.2.1.47-55.2021.
M. Yamin and A. F. Giyats, “Support Vector Regression Approach for Wind Forecasting,†International Journal of Advanced Science Computing and Engineering, vol. 4, no. 2, pp. 95–101, Aug. 2022, doi: 10.30630/IJASCE.4.2.84.
V. Patil, P. Thakkar, C. Shah, T. Bhat, and S. P. Godse, “Detection and Prevention of Phishing Websites Using Machine Learning Approach,†Proceedings - 2018 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018, Jul. 2018, doi: 10.1109/ICCUBEA.2018.8697412.
K. L. Chiew, C. L. Tan, K. S. Wong, K. S. C. Yong, and W. K. Tiong, “A new hybrid ensemble feature selection framework for machine learning-based phishing detection system,†Inf Sci (N Y), vol. 484, pp. 153–166, May 2019, doi: 10.1016/J.INS.2019.01.064.
A. Basit, M. Zafar, A. R. Javed, and Z. Jalil, “A Novel Ensemble Machine Learning Method to Detect Phishing Attack,†Proceedings - 2020 23rd IEEE International Multi-Topic Conference, INMIC 2020, Nov. 2020, doi: 10.1109/INMIC50486.2020.9318210.
O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,†Expert Syst Appl, vol. 117, pp. 345–357, Mar. 2019, doi: 10.1016/J.ESWA.2018.09.029.
M. N. Alam, D. Sarma, F. F. Lima, I. Saha, R. E. Ulfath, and S. Hossain, “Phishing attacks detection using machine learning approach,†Proceedings of the 3rd International Conference on Smart Systems and Inventive Technology, ICSSIT 2020, pp. 1173–1179, Aug. 2020, doi: 10.1109/ICSSIT48917.2020.9214225.
A. B. Altamimi et al., “PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning,†IEEE Access, 2023, doi: 10.1109/ACCESS.2023.3287226.
M. H. Alkawaz, S. J. Steven, A. I. Hajamydeen, and R. Ramli, “A comprehensive survey on identification and analysis of phishing website based on machine learning methods,†ISCAIE 2021 - IEEE 11th Symposium on Computer Applications and Industrial Electronics, pp. 82–87, Apr. 2021, doi: 10.1109/ISCAIE51753.2021.9431794.
APIVoid, Threat Analysis APIs for Threat Detection & Prevention, https://www.apivoid.com/ (accessed Aug. 25, 2023).
M. Sytnik and E. Bubnov, “An analysis of the life cycle of phishing and scam pages | Securelist.†https://securelist.com/phishing-page-life-cycle/105171/ (accessed Aug. 25, 2023).
L. Yujian and L. Bo, “A normalized Levenshtein distance metric,†IEEE Trans Pattern Anal Mach Intell, vol. 29, no. 6, pp. 1091–1095, Jun. 2007, doi: 10.1109/TPAMI.2007.1078.
S. Grashchenko, “Levenshtein Distance Computation | Baeldung on Computer Science.†https://www.baeldung.com/cs/levenshtein-distance-computation (accessed Aug. 28, 2023).
DOI: http://dx.doi.org/10.18517/ijaseit.13.5.19037
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development