skip to main content
research-article

An Anti-Phishing System Employing Diffused Information

Published:01 April 2014Publication History
Skip Abstract Section

Abstract

The phishing scam and its variants are estimated to cost victims billions of dollars per year. Researchers have responded with a number of anti-phishing systems, based either on blacklists or on heuristics. The former cannot cope with the churn of phishing sites, while the latter usually employ decision rules that are not congruent to human perception. We propose a novel heuristic anti-phishing system that explicitly employs gestalt and decision theory concepts to model perceptual similarity. Our system is evaluated on three corpora contrasting legitimate Web sites with real-world phishing scams. The proposed system’s performance was equal or superior to current best-of-breed systems. We further analyze current anti-phishing warnings from the perspective of warning theory, and propose a new warning design employing our Gestalt approach.

References

  1. Aaron, G. and Manning, R. 2012. Phishing activity trends report, 2nd half 2011. Anti-Phishing Working Group, San Francisco, CA.Google ScholarGoogle Scholar
  2. Andresen, D., Yang, T., Egecioglu, O., Ibarra, O. H., and Smith, T. R. 1996. Scalability issues for high performance digital libraries on the World Wide Web. In Proceedings of IEEE Forum on Research and Technology Advances in Digital Libraries. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ANSI 2007a. ANSI Z535.1-2006: American national standard for safety colors. National Electrical Manufacturers Association, Rosslyn, VA.Google ScholarGoogle Scholar
  4. ANSI 2007b. ANSI Z535.2-2007: American national standard for environmental and facility safety signs. National Electrical Manufacturers Association, Rosslyn, VA.Google ScholarGoogle Scholar
  5. ANSI 2007c. ANSI Z535.3-2007: American national standard criteria for safety symbols. National Electrical Manufacturers Association, Rosslyn, VA.Google ScholarGoogle Scholar
  6. ANSI 2007d. ANSI Z535.4-2007: American national standard for product safety signs and labels. National Electrical Manufacturers Association, Rosslyn, VA.Google ScholarGoogle Scholar
  7. Bardera, A., Feixas, M., Boada, I., and Sbert, M. 2006. Compression-based image registration. In Proceedings of the IEEE International Symposium on Information Theory.Google ScholarGoogle Scholar
  8. Barraclough, P. A., Hossain, M. A., Tahir, M. A., Sexton, G., and Aslam, N. 2013. Intelligent phishing detection and protection scheme for online transactions. Expert Syst. Appl. 40, 11, 4697--4706. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Basnet, R. B., Sung, A. H., and Liu, Q. 2012. Feature selection for improved phishing detection. Lecture Notes in Computer Science, vol. 7345, 252--261. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Becker, R. A., Volinsky, C., and Wilks, A. R. 2010. Fraud detection in telecommunications: History and lessons learned. Technometrics 52, 1, 20--33.Google ScholarGoogle ScholarCross RefCross Ref
  11. Bennett, C. H., Li, M., and Ma, B. 2003. Chain letters and evolutionary histories. Scientific Amer. 288, 6, 76--81.Google ScholarGoogle ScholarCross RefCross Ref
  12. Bliss, J. P. and Fallon, C. K. 2006. Active warnings: False alarms. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 231--242.Google ScholarGoogle Scholar
  13. Burrows, M. and Wheeler, D. J. 1994. A block-sorting lossless data compression algorithm. HP Labs System Research Center, Palo Alto, CA.Google ScholarGoogle Scholar
  14. Cai, D., Yu, S., Wen, J. R., and Ma, W. Y. 2003. Extracting content structure for Web pages based on visual representation. Lecture Notes in Computer Science, vol. 2642, 406--417. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cameron, K. A. and Dejoy, D. M. 2006. The persuasive functions of warnings: Theory and models. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 301--312.Google ScholarGoogle Scholar
  16. Carnec, M., Le Callet, P., and Barba, D. 2003. An image quality assessment method based on perception of structural information. In Proceedings of the International Conference on Image Processing. 14--17.Google ScholarGoogle Scholar
  17. Cebrián, M., Alfonseca, M., and Ortega, A. 2005. Common pitfalls using the normalized compression distance: What to watch out for in a compressor. Commun. Inform. Syst. 5, 4, 367--384.Google ScholarGoogle ScholarCross RefCross Ref
  18. Chaitin, G. J. 1987. Algorithmic Information Theory. Cambridge University Press, Cambridge, UK. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Charikar, M. S. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the ACM Symposium on Theory of Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. 2002. SMOTE: Syntethic minority over-sampling technique. J. Artif. Intell. Res. 16, 321--357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chen, T. C., Dick, S., and Miller, J. 2010. Detecting visually similar Web pages: Application to phishing detection. ACM Trans. Internet Technol. 10, 2, 1--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Chen, Z., Aghakhani, S., Man, J., and Dick, S. 2011. ANCFIS: A neuro-fuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 19, 2, 305--322. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Chou, N., Ledesma, R., Teraguchi, Y., and Boneh, D. 2004. Client-side defense against web-based identity theft. In Proceedings of the Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  24. Cilibrasi, R. and Vitanyi, P. M. B. 2005. Clustering by compression. IEEE Trans. Inf. Theory 51, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences 2nd Ed. Lawrence Earlbaum Associates, Hillsdale, NJ.Google ScholarGoogle Scholar
  26. CompuServe, I. 1987. Graphics Interchange Format (Vol. GIF87). World Wide Web Consortium.Google ScholarGoogle Scholar
  27. Consortium. 2010. Web security context: User interface guidelines. World Wide Web Consortium.Google ScholarGoogle Scholar
  28. Conzola, V. C. and Wogalter, M. S. 2001. A communication-human information processing (C-HIP) approach to warning effectiveness in the workplace. J. Risk Res. 4, 4, 309--322.Google ScholarGoogle ScholarCross RefCross Ref
  29. Cox, E. P. and Wogalter, M. S. 2006. Warning source. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 111--122.Google ScholarGoogle Scholar
  30. Daly, S. 1993. The visible differences predictor: An algorithm for the assessment of image fidelity. In Digital Images and Human Vision, A. B. Watson Ed., MIT Press Cambridge, MA, 179--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Desaulniers, D. R. 1987. Layout, organization and the effectiveness of consumer product warnings. In Proceedings of the Human Factors Society Annual Meeting.Google ScholarGoogle ScholarCross RefCross Ref
  32. Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic security skins. In Proceedings of the Symposium on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Dorner, D. Ed. 1996. The Logic of Failure: Recognizing and Avoiding Error in Complex Situations. Metropolitan Books, New York, NY.Google ScholarGoogle Scholar
  34. Egelman, S., Cranor, L. F., and Hong, J. 2008. You’ve been warned: An empirical study of the effectiveness of Web browser phishing warnings. In Proceedings of CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Emigh, A. 2005. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. Radix Labs, Incline Village, NV.Google ScholarGoogle Scholar
  36. Fawcett, T. 2006. An introduction to ROC analysis. Pattern Recog. Lett. 27, 8, 861--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Fette, I., Sadeh, N., and Tomasic, A. 2007. Learning to detect phishing emails. In Proceedings of the International Conference on World Wide Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Fetterly, D., Manasse, M., and Najork, M. 2003. On the evolution of clusters of near-duplicate Web pages. In Proceedings of LA-WEB. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Fossi, M., Johnson, E., Turner, D., Mack, T., Blackbird, J., McKinney, D., Low, M. K., Adams, T., Laucht, M. P., and Gough, J. 2008. Symantec report on the underground economy. Symantec Corporation, Cupertino, CA.Google ScholarGoogle Scholar
  40. Frascara, J. 2006. Typography and the visual design of warnings. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 385--405.Google ScholarGoogle Scholar
  41. Fu, A. Y., Wenyin, L., and Deng, X. 2006. Detecting phishing Web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Depend. Secure Comput. 3, 4, 301--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Gao, Y., Zhang, F., Hao, B., and Gong, W. 2012. Research and application of the detection on duplicate Web pages on campus search engine. In Proceedings of the 3rd IEEE International Conference on Software Engineering and Service Science.Google ScholarGoogle Scholar
  43. Gilsdorf, E. A. 2011. Semantic annotation of product safety information. In Proceedings of the IEEE International Conference on Product Compliance Engineering.Google ScholarGoogle ScholarCross RefCross Ref
  44. Gordon, I. E. 2004. Theories of Visual Perception 3rd Ed. Psychology Press, New York, NY.Google ScholarGoogle Scholar
  45. Graham, L. 2008. Gestalt theory in interactive media design. J. Hum. Soc. Sci. 2, 1, 1--12.Google ScholarGoogle Scholar
  46. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. 2009. The WEKA data mining software: An update. SIGKDD Explor. 11, 1, 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Haveliwala, T. H., Gionis, A., Klein, D., and Indyk, P. 2002. Evaluating strategies for similarity search on the Web. In Proceedings of the International Conference on World Wide Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Henzinger, M. 2006. Finding near-duplicate Web pages: A large-scale evaluation of algorithms. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Herzog, C., Kordomatis, I., Holzinger, W., Fayzrakhmanov, R. R., and Krüpl-Sypien, B. 2013. Feature-based object identification for Web automation. In Proceedings of the 28th Annual ACM Symposium on Applied Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Hescott, B. and Koulomzin, D. 2007. On clustering images using compression. Boston University Computer Science Department.Google ScholarGoogle Scholar
  51. IESG. 1996. PNG (Portable Network Graphics) Specification (Vol. RFC 2083). Internet Engineering Steering Group.Google ScholarGoogle Scholar
  52. Islam, R. and Abawajy, J. 2013. A multi-tier phishing detection and filtering approach. J. Netw. Comput. Appl. 36, 1, 324--335. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Jiang, S., Song, X., and Huang, Q. 2013. Relative image similarity learning with contextual information for Internet cross-media retrieval. Multimedia Syst.Google ScholarGoogle Scholar
  54. Kalviainen, M. 2007. The role of sign elements in holistic product meaning. In Proceedings of the SeFun International Seminar: Design Semiotics in Use.Google ScholarGoogle Scholar
  55. Kocsor, A., Kertész-Farkas, A., Kaján, L., and Pongor, S. 2006. Application of compression-based distance measures to protein sequence classification: A methodological study. Bioinformatics, 22, 4, 407--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. L’Huillier, G., Weber, R., and Figueroa, N. 2009. Online phishing classification using adversarial data mining and signaling games. In Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Lesch, M. F. 2006. Consumer product warnings: Research and recommendations. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 137--146.Google ScholarGoogle Scholar
  58. Li, M. and Zhu, Y. 2006. Image classification via LZ78 based string kernel: A comparative study. Lecture Notes in Computer Science, vol. 3918, 704--712. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Li, M., Chen, X., Li, X., Ma, B., and Vitanyi, P. M. B. 2004. The similarity metric. IEEE Trans. Inf. Theory 50, 12, 3250--3264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Liu, G., Xiang, G., Pendleton, B. A., Hong, J. I., and Liu, W. 2011. Smartening the crowds: Computational techniques for improving human verification to fight phishing scams. In Proceedings of SOUPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Lubin, J. 1993. The use of psychophysical data and models in the analysis of display system performance. In Digital Images and Human Vision, A. B. Watson Ed., MIT Press, Cambridge, MA, 163--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Macedonas, A., Besiris, D., Economou, G., and Fotopoulos, S. 2008. Dictionary based color image retrieval. J. Vis. Commun. Image Retriev. 19, 464--470. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. MacKay, W. E. 1991. Triggers and barriers to customizing software. In Proceedings of the SIGCHI Conference Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Maurer, M.-E. and Herzner, D. 2012. Using visual website similarity for phishing detection and reporting. In Proceedings of CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. McGrath, J. M. 2011. The role of equipment warning labels in the industrial workplace. Int. J. Occup. Safety Ergonom. 17, 1, 49--60.Google ScholarGoogle ScholarCross RefCross Ref
  66. Meyer, J. 2006. Responses to dynamic warnings. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 221--229.Google ScholarGoogle Scholar
  67. Paab, G., Reinhardt, W., Ruping, S., and Wrobel, S. 2008. Data mining for security and crime detection. In Security Informatics and Terrorism: Patrolling the Web, C. S. Gal, P. B. Kantor, and B. Shapira Eds., IOS Press, Amsterdam, The Netherlands, 56--70.Google ScholarGoogle Scholar
  68. Pappas, T. and Safranek, R. 2000. Perceptual criteria for image quality evaluation. In Handbook of Image and Video Processing, A. C. Bovik Ed., Academic Press, San Diego, CA, 669--684.Google ScholarGoogle Scholar
  69. Pennebaker, W. B. and Mitchell, J. L. 1992. JPEG: Still Image Data Compression Standard. Kluwer Academic Publishers, Norwell, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Provost, F., Fawcett, T., and Kohavi, R. 1998. The case against accuracy estimation for comparing induction algorithms. In Proceedings of the International Conference on Machine Learning. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Qi, X. and Davison, B. D. 2009. Web page classification: Features and algorithms. ACM Comput. Surv. 41, 2, 11--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Ramanathan, V. and Wechsler, H. 2012. Phishing Website detection using latent Dirichlet allocation and AdaBoost. In Proceedings of the IEEE International Conference Intelligence and Security Informatics.Google ScholarGoogle Scholar
  73. Rogers, E. 1995. Diffusion of Innovations 4th Ed. Free Press, New York, NY.Google ScholarGoogle Scholar
  74. Rosiello, A. P. E., Kirda, E., Kruegel, C., and Ferrandi, F. 2007. A layout-similarity-based approach for detecting phishing pages. In Proceedings of the International Conference Security and Privacy in Communications Networks.Google ScholarGoogle Scholar
  75. Rousseau, G. K. and Wogalter, M. S. 2006. Research on warning signs. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 147--158.Google ScholarGoogle Scholar
  76. Salomon, D. 2007. Data Compression: The Complete Reference 4th Ed. Springer-Verlag, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. 2007. The emperor’s new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Sculley, D. and Brodley, C. E. 2006. Compression and machine learning: A new perspective on feature space vectors. In Proceedings of the Data Compression Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Smith-Jackson, T. L. and Wogalter, M. S. 2006. Methods and procedures in warning research. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 23--33.Google ScholarGoogle Scholar
  80. Sotirakopoulos, A., Hawkey, K., and Beznosov, K. 2011. On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings. In Proceedings of the Symposium on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Staff. 2007. Issues in Using DNS Whois data for phishing site take down. AntiPhishing Working Group DNS Policy Committee, Lexington, MA.Google ScholarGoogle Scholar
  82. Staff. 2008a. Mozilla Thunderbird. http://www.mozilla.com/en-US/thunderbird/.Google ScholarGoogle Scholar
  83. Staff. 2008b. Phishing activity trends report for the month of January 2008. Anti-Phishing Working Group, Lexington, MA.Google ScholarGoogle Scholar
  84. Staff. 2009. Convert HTML to Image. http://www.converthtmltoimage.com/.Google ScholarGoogle Scholar
  85. Staff. 2010. Cybercriminals creating 57,000 fake Web sites every week. SecurityWeek.Google ScholarGoogle Scholar
  86. Staff. 2011a. Alexa: The Web Information Company. http://www.alexa.com.Google ScholarGoogle Scholar
  87. Staff. 2011b. PhishTank. http://www.phishtank.com/.Google ScholarGoogle Scholar
  88. Staff. 2011c. RSA Identity Protection and Verification Suite. http://www.rsa.com/node.aspx?id=3017.Google ScholarGoogle Scholar
  89. Staff. 2012a. Safe Browsing API. https://developers.google.com/safe-browsing/.Google ScholarGoogle Scholar
  90. Staff. 2012b. Spear-phishing email: Most favored APT attack bait. In Trend Micro Incorporated Research Papers, TrendLabs APT Research Team, Cupertino, CA.Google ScholarGoogle Scholar
  91. Staff. 2012c. Warning Messages. http://msdn.microsoft.com/en-us/library/windows/desktop/aa511263.aspx.Google ScholarGoogle Scholar
  92. Sudjianto, A., Nair, S., Yuan, M., Zhang, A., Kern, D., and Cela-Díaz, F. 2010. Statistical methods for fighting financial crimes. Technometrics, 52, 1, 5--19.Google ScholarGoogle ScholarCross RefCross Ref
  93. Taubman, D. S. and Marcellin, M. W. 2002. JPEG2000---Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Norwell, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Telles, G. P., Minghim, R., and Paulovich, F. V. 2007. Normalized compression distance for visual analysis of document collections. Comput. Graph. 31, 3, 327--337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Tseng, C.-Y. 2009. Incremental SVM model for spam detection on dynamic email social networks. In Proceedings of the International Conference on Computational Science and Engineering. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Wang, Z. and Bovik, A. C. 2006. Modern Image Quality Assessment. Morgan & Claypool, New York, NY.Google ScholarGoogle Scholar
  97. Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Proc. 13, 4, 600--612. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Wenyin, L., Liu, G., Qiu, B., and Quan, X. 2012. Anti-phishing through phishing target discovery. IEEE Internet Comput. 16, 2, 52--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Watson, A. B. 1993. Dctune: A technique for visual optimization of DCT quantization matrices for individual images. Society for Information Display Digest Technology Papers, 24, 946--949.Google ScholarGoogle Scholar
  100. Wogalter, M. S. 2006a. Communication-human information processing (C-HIP) model. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 51--61.Google ScholarGoogle Scholar
  101. Wogalter, M. S. 2006b. Purposes and scope of warnings. In Handbook of Warnings, M. S. Wogalter Ed., Lawrence Erlbaum Associates, Mahwah, NJ, 3--9.Google ScholarGoogle Scholar
  102. Workman, M. 2008. Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Amer. Soc. Inf. Sci. Tech. 59, 4, 662--674. Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Wu, O., Hu, W., and Shi, L. 2013. Measuring the visual complexities of web pages. ACM Trans. Web 7, 1, 1--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Xiang, G. and Hong, J. I. 2009. A hybrid phish detection approach by identity discovery and keywords retrieval. In Proceedings of the International Conference on World Wide Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Xiang, G., Hong, J., Cranor, L., and Rose, C. P. 2011. CANTINA+: A feature-rich machine learning framework for detecting phishing Web sites. http://www.cs.cmu.edu/~jasonh/publications/acmtissec2010-cantina-journal-submitted.pdf.Google ScholarGoogle Scholar
  107. Yue, C. and Wang, H. 2010. BogusBiter: A transparent protection against phishing attacks. ACM Trans. Internet Technol. 10, 2, 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Zhang, Y., Hong, J. I., and Cranor, L. F. 2007. Cantina: A content-based approach to detecting phishing Web sites. In Proceedings of the International Conference on World Wide Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Zhuang, W., Jiang, Q., and Xiong, T. 2012. An intelligent anti-phishing strategy model for phishing website detection. In Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Ziv, J. and Lempel, A. 1977. A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory 23, 3, 337--343. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Anti-Phishing System Employing Diffused Information

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Information and System Security
                ACM Transactions on Information and System Security  Volume 16, Issue 4
                April 2014
                154 pages
                ISSN:1094-9224
                EISSN:1557-7406
                DOI:10.1145/2617317
                • Editor:
                • Gene Tsudik
                Issue’s Table of Contents

                Copyright © 2014 ACM

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 April 2014
                • Accepted: 1 February 2014
                • Revised: 1 November 2013
                • Received: 1 January 2013
                Published in tissec Volume 16, Issue 4

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader
              About Cookies On This Site

              We use cookies to ensure that we give you the best experience on our website.

              Learn more

              Got it!