CPhD: Entire insight to detect phishing attack

Phishing is a type of Internet procedure to seek to get a victim’s credentials such as passwords, credit card numbers, bank account details and other sensitive information by defrauded webpages. Deceptive webpages have particular features to deflect victims to fall into trap. Comprehensive Phishing Detector (CPhD) system can distinguish phishing websites from legitimate websites by extracting these features from URL pattern, website content, images and animations of webpages. | International Journal of Computer Networks and Communications Security VOL. 5, NO. 11, NOVEMBER 2017, 248–257 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) CPhD: Entire Insight to Detect Phishing Attack AZAR HOSSEINI1 and AREZOO HOSSEINI2 1 Department of Electronic and Computer Engineering, School of Electrical Engineering, Iran University of Science and Technology, Tehran 16846, Iran 2 Pardis Nasibe-Shahid Sherafat, Farhangian University, Tehran, 19396-14464, Iran 1 , ABSTRACT Phishing is a type of Internet procedure to seek to get a victim’s credentials such as passwords, credit card numbers, bank account details and other sensitive information by defrauded webpages. Deceptive webpages have particular features to deflect victims to fall into trap. Comprehensive Phishing Detector (CPhD) system can distinguish phishing websites from legitimate websites by extracting these features from URL pattern, website content, images and animations of webpages. The central goal of this system is reducing the run-time of investigation and using instant calculation method and algorithms. Approximately, for every 1,200,000 requests in DNS logs or TLS/SSL logs we need 12min to explore phishing-IPs, 14ms to compare every-two URLs for seeking suspicious URL, to compare every two sites words and finally 3min to compare two images. These tests were implemented on 90 Iranian banks, social network sites, search engines and some other well-known sites. Keywords: Taxonomy-Phishing, URL, Levenshtein, Correlation, DNS. roots, classification and detection methods (Fig. 1). Classification branch focuses on various insights into Phishing attacks use both social engineering and deceive and grab victim’s information such as poptechnical subterfuge to steal consumers’ personal up window to add interactivity and capture victim’s identity data and financial account credentials. attention, .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
103    134    5    28-04-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.