Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages
Mallikka Rajalingam, Salah Ali Alomari, Putra Sumari
Pages - 1 - 18 | Revised - 15-01-2012 | Published - 21-02-2012
MORE INFORMATION
KEYWORDS
Image Clustering and Retrieval, Anti-Phishing mechanism, Digital Image Processing, Security, CCH
ABSTRACT
Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker (Phisher). Attempts to stop phishing by preventing a user from interacting with a malicious web site have shown to be ineffective. In this paper, present an effective image-based anti-phishing scheme based on discriminative key point features in WebPages. We use an invariant content descriptor, the Contrast Context Histogram (CCH), to compute the similarity degree between suspicious pages and authentic pages. To determine whether two images are similar, a common approach involves extracting a vector of salient features from each image, and computing the distance between the vectors, which is taken as the degree of visual difference between the two images. The results show that the proposed scheme achieves high accuracy and low error rates.
1 | Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing. |
2 | Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2). |
3 | Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud. |
4 | Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3). |
5 | Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3). |
6 | Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws. |
7 | Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE. |
8 | Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2). |
9 | Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. |
1 | Google Scholar |
2 | Academic Journals Database |
3 | CiteSeerX |
4 | Bielefeld Academic Search Engine (BASE) |
5 | Scribd |
6 | SlideShare |
7 | PdfSR |
A. Abbasi and H. Chen. “A comparison of fraud cues and classification methods for fake escrow website detection”. Springer, Inf Technol March, 2009 | |
A. Kannan, V. Mohan and N. Anbazhagan. ”Image Clustering and Retrieval using Image Mining Techniques”. IEEE International Conference on Computational Intelligence and Computing Research, vol.2, 2010 | |
A. Martin, Na.Ba.Anutthamaa, M. Sathyavathy, Marie Manjari Saint Francois and Dr. Prasanna Venkatesan. “A Framework for Predicting Phishing Websites Using Neural Networks”. International Journal of Computer Science Issues (IJCSI). vol. 8, Issue 2, March 2011 | |
APWG, http://www.antiphishing.org/index.html, accessed March 2011 | |
APWG. http://www.apwg.org/reports/APWG_GlobalPhishingSurvey_1H2009.pdf , accessed 8 August 2009 | |
Bryan Parno, Cynthia Kuo, and Adrian Perrig. “Phoolproof of Phishing Prevention”. Financial Cryptography and Data Security, Springer, 2006 | |
http://mybank.com/ebanking] | |
Juan Chen and Chuanxiong. “Online Detection and Prevention of Phishing Attacks”. IEEE Communications and Networking, NSFC, 2005 | |
K. Chen, C. Huang and C. Chen. “Fighting Fishing With Discriminative Keypoint Features”. IEEE INTERNET COMPUTING, 2009 | |
K. Plossl, H. Federrath and T. Nowey. “Protection Mechanisms Against Phishing Attacks”. Proc, 2nd Intl.Conf. on TrusBus 05, LNCS 3592, Springer-Verlag, 2005 | |
M. Aburrous, M.A.Hossain, Keshav Dahal and Fadi Thabtah. “Experimental Case Studies for Investigating E-Business Phishing Techniques and Attack Strategies”. Springer Science, Cong Comput 2010, vol.2, No.242-253, April 2010 | |
M. Chandrasekaran, K Narayanan and S Upadhaya,”PHONEY:Mimicking User Response to Detect Phishing Attacks”, To appear at TSPUC Workshop, affiliated with IEEE WoWMoM, 2005 | |
M. Jakobsson, and S. Myers: ‘Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft’ Wiley, 2007 | |
M. Wu, R.C.Miller, S.L.Garfinkel, “Do security toolbars actually prevents phishing attacks?”, in CHI (to appear), 2006. [online]. Available: http://www.simson.net/ref/2006/CHI-securitytoolbar- final.pdf | |
N.P. Singh. “Online Frauds in Banks with Phishing”. Journal of Internet Banking and Commerce, vol.12, 2007 | |
Phishtank. 2008 http://www.phishtank.com/phish_archive.php, accessed 14 November 2008 | |
R. Kanthety and S. Saradhi. “Prevention of Phishing Attacks using Link-Guard Algorithm”. International Journal of Computer Science Issues (IJCSI). vol. 7, no. 2, suppl.4, 31p.March 2010 | |
S. Kierkegaard, “Swallowing the bait, hook, line and sinker: Phishing and Pharming and now rat-ting!”, in Managing Information Services in Financial Services H.R. Roa, M. Gupta, S. J. Upadhaya, Eds.USA:IGI publishing, 2008, pp.241-253. | |
S.R. Kodituwakku et al. ”Comparison of Color Features for Image Retrieval”. Indian Journal of Computer Science and Engineering, vol.1, no.3, pp.207-211, 2004 | |
SOPHOS 2005, http://www.sophos.com/whitepapers/sophos-phishing-wpuk.pdf, accessed April 2011 | |
Thomas J. Holt and Danielle C. Graves. “A Qualitative Analysis of Advance Fee Fraud E-mail Schemes”. International journal of Cyber Criminology, vol.1, issue.1, 2006 | |
Tom Jagatic, Natheniel Johnson, Markus Jakobsson, and Filippo Menczer. “Social Phishing”. Communications of ACM, 2005 | |
Total Number of Fraud Complaints & amount paid. 2003, http://www.consumer.gov/sentinel/states03/fraud_complaint_trends.pdf. | |
W. Burger and M. Burge. “Digital image processing: an algorithmic introduction using Java”. Springer, Pages: 240-250, 2008 | |
Webopedia, http://www.webopedia.com/TERM/P/phishing.html, accessed April 2011 | |
Wikipedia, http://en.wikipedia.org/wiki/Phishing, accessed April 2011 | |
Miss Mallikka Rajalingam
Universiti Sains malaysia - Malaysia
mallikka2002@yahoo.com
Mr. Salah Ali Alomari
Universiti Sains malaysia - Malaysia
Associate Professor Putra Sumari
Universiti Sains malaysia - Malaysia
|
|
|
|
View all special issues >> | |
|
|