Sciweavers

TELSYS
2010
132views more  TELSYS 2010»
13 years 6 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
CHI
2010
ACM
13 years 6 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
JCS
2010
135views more  JCS 2010»
13 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
INFOCOM
2010
IEEE
13 years 10 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...
IEEECIT
2010
IEEE
13 years 10 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
GLOBECOM
2008
IEEE
14 years 15 days ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
CEAS
2008
Springer
14 years 1 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
USS
2008
14 years 1 months ago
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
Marco Cova, Christopher Kruegel, Giovanni Vigna
NSDI
2008
14 years 1 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta