Abstract. We propose a new phishing detection heuristic based on the search results returned from popular web search engines such as Google, Bing and Yahoo. The full URL of a website a user intends to access is used as the search string, and the number of results returned and ranking of the website are used for classification. Most of the time, legitimate websites get back large number of results and are ranked first, whereas phishing websites get back no result and/or are not ranked at all. To demonstrate the effectiveness of our approach, we experimented with four well-known classification algorithms – Linear Discriminant Analysis, Näıve Bayesian, K-Nearest Neighbour, and Support Vector Machine – and observed their performance. The K-Nea...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is a type of identity fraud that involves carrying sensitive information including username...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
The phishing is a kind of e-commerce lure which try to steal the confidential information of the web...
Phishing is nothing but one of the kinds of network crimes. This paper presents an efficient approac...
Phishing is a security threat with serious effects on individuals as well as on the targeted brands....
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion US...
International audienceDespite the growth of prevention techniques, phishing remains an important thr...
Due to the rapid growth of the Internet, users change their preference from traditional shopping to ...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
This paper proposes a phishing detection technique based on the difference between the target and ac...
Abstract—Phishing is an attempt to fraudulently acquire users ’ sensitive information, such as passw...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The Internet has enabled unprecedented communication and new technologies. Concomitantly, it has bro...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is a type of identity fraud that involves carrying sensitive information including username...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
The phishing is a kind of e-commerce lure which try to steal the confidential information of the web...
Phishing is nothing but one of the kinds of network crimes. This paper presents an efficient approac...
Phishing is a security threat with serious effects on individuals as well as on the targeted brands....
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion US...
International audienceDespite the growth of prevention techniques, phishing remains an important thr...
Due to the rapid growth of the Internet, users change their preference from traditional shopping to ...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
This paper proposes a phishing detection technique based on the difference between the target and ac...
Abstract—Phishing is an attempt to fraudulently acquire users ’ sensitive information, such as passw...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The Internet has enabled unprecedented communication and new technologies. Concomitantly, it has bro...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is a type of identity fraud that involves carrying sensitive information including username...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...