Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3
Page No. 513 - 519

Websites Phishing Detectio Using URLs Tokens as a Discriminating Features

Authors : Ammar Yahya Daeef, R. Badlishah Ahmad and Yasmin Yacob

References

Aaron, G., R. Rasmussen and A. Routt, 2014. Global phishing survey: Trends and domain name use in 1H2014. http://docs.apwg.org/reports/APWG_Global_Phishing_Report_1H_2014.pdf.

Blum, A., B. Wardman, T. Solorio and G. Warner, 2010. Lexical feature based phishing URL detection using online learning. Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, October 4-8, 2010, Chicago, IL., USA., pp: 54-60.

Bozkir, A.S. and E.A. Sezer, 2016. Use of HOG descriptors in phishing detection. Proceedings of the 4th International Symposium on Digital Forensic and Security (ISDFS), April 25-27, 2016, IEEE, Ankara, Turkey, ISBN:978-1-4673-9865-7, pp: 148-153.

Kan, M.Y. and H.O.N. Thi, 2005. Fast webpage classification using URL features. Proceedings of the 14th ACM International Conference on Information and Knowledge Management, October 31-November 05, 2005, ACM, Bremen, Germany, ISBN:1-59593-140-6, pp: 325-326.

Khonji, M., Y. Iraqi and A. Jones, 2011. Lexical URL analysis for discriminating phishing and legitimate websites. Proceedings of the 8th Annual Conference on Collaboration Electronic Messaging Anti-Abuse and Spam, September 01-02, 2011, ACM, Perth, Australia, ISBN:978-1-4503-0788-8, pp: 109-115.

Khonji, M., Y. Iraqi and A. Jones, 2013. Phishing detection: A literature survey. IEEE Commun. Surveys Tutorials, 15: 2091-2121.
CrossRef  |  Direct Link  |  

Ma, J., L.K. Saul, S. Savage and G.M. Voelker, 2011. Learning to detect malicious URLs. ACM Trans. Intellig. Syst. Technol., 2: 1-23.

Marchal, S., J. Francois, R. State and T. Engel, 2014. Phishstorm: Detecting phishing with streaming analytics. IEEE. Trans. Netw. Serv. Manage., 11: 458-471.
CrossRef  |  Direct Link  |  

McGrath, D.K. and M. Gupta, 2008. Behind phishing: An examination of phisher modi operandi. Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, CA, USA., pp: 1-8.

Thomas, K., C. Grier, J. Ma, V. Paxson and D. Song, 2011. Design and evaluation of a real-time url spam filtering service. Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP), May 22-25, 2011, IEEE, California, USA., pp: 447-462.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved