Phishing webpage detection using weighted URL tokens for identity keywords retrieval
Phishing is an online identity theft that has threatened Internet users for more than a decade. This paper proposes an anti-phishing technique based on a weighted URL tokens system, which extracts identity keywords from a query webpage. Using the identity keywords as search terms, a search engine is...
| Main Authors: | Tan, Choon Lin, Chiew, Kang Leng, Sze, San Nah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Verlag
2017
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/14955/ http://ir.unimas.my/id/eprint/14955/1/Phishingwebpage-detection-usingweighted-URL-tokens-for-identity-keywords-retrieval_2017_Lecture-Notes-in-Electrical-Engineering.html |
Similar Items
PhishWHO: Phishing webpage detection via identity keywords
extraction and target domain name finder
by: Tan, Choon Lin, et al.
Published: (2016)
by: Tan, Choon Lin, et al.
Published: (2016)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Phishing detection via identification of website identity
by: Ee, Hung Chang, et al.
Published: (2013)
by: Ee, Hung Chang, et al.
Published: (2013)
Phishing Email Detection Technique by using Hybrid Features
by: Lew, May Form, et al.
Published: (2015)
by: Lew, May Form, et al.
Published: (2015)
The effectiveness of url features on phishing emails classification using machine learning approach
by: Ahmad Fadhil Naswir,, et al.
Published: (2022)
by: Ahmad Fadhil Naswir,, et al.
Published: (2022)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Enhancement of the tour guide webpage for Kinta tour guide webpage based on human computer interaction (HCI) elements by Jacob Nielsen
by: Lay Kee, New
Published: (2012)
by: Lay Kee, New
Published: (2012)
Effective keyword query structuring using NER for XML retrieval
by: Roko, Abubakar, et al.
Published: (2015)
by: Roko, Abubakar, et al.
Published: (2015)
Weight-adjustable ranking for keyword search in
relational satabases
by: Jou, Chichang., et al.
Published: (2018)
by: Jou, Chichang., et al.
Published: (2018)
Electronic token system using RF technology
by: Thamayanthi, Thangavelu
Published: (2008)
by: Thamayanthi, Thangavelu
Published: (2008)
Token of courage
by: The Star
Published: (2013)
by: The Star
Published: (2013)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Utilisation of website logo for phishing detection
by: Chiew, K.L., et al.
Published: (2015)
by: Chiew, K.L., et al.
Published: (2015)
Design and development of automated token assembly system
by: Khaw, Jia Ying
Published: (2021)
by: Khaw, Jia Ying
Published: (2021)
Shape feature representation in similarity measurement for content-based image retrieval
by: Chiew, Kang Leng
Published: (2003)
by: Chiew, Kang Leng
Published: (2003)
Expediency heuristic in travel agency webpage
by: Soffia, Suliman
Published: (2011)
by: Soffia, Suliman
Published: (2011)
Expediency heuristic in university conference webpage
by: Mohd Sidek, Roslina, et al.
Published: (2010)
by: Mohd Sidek, Roslina, et al.
Published: (2010)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Throw & throws keyword
by: Khowaja, Kamran, et al.
Published: (2011)
by: Khowaja, Kamran, et al.
Published: (2011)
More on const keywords
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Static: the multipurpose keyword
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Review of the machine learning methods in the classification of phishing attack
by: Jupin, John Arthur, et al.
Published: (2019)
by: Jupin, John Arthur, et al.
Published: (2019)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Rangkaian gelang dengan laluan token
by: Mohd Saman, Md. Yazid
by: Mohd Saman, Md. Yazid
How comfortable are Malaysian users in utilizing webpages of small businesses?
by: Abdullah, Moha Asri, et al.
Published: (2014)
by: Abdullah, Moha Asri, et al.
Published: (2014)
How comfortable are Malaysian users in utilizing webpages of small businesses?
by: Abdullah, Moha Asri, et al.
Published: (2015)
by: Abdullah, Moha Asri, et al.
Published: (2015)
How comfortable are Malaysian users in utilizing webpages of small businesses?
by: Abdullah, Moha Asri, et al.
Published: (2015)
by: Abdullah, Moha Asri, et al.
Published: (2015)
An ontology-based webpage classification approach for the knowledge grid environment
by: Dong, Hai, et al.
Published: (2009)
by: Dong, Hai, et al.
Published: (2009)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
Email Phishing Detection Model using CNN Model
by: Gurumurthy, M., et al.
Published: (2024)
by: Gurumurthy, M., et al.
Published: (2024)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
by: Khoo, Zong Zheng
Published: (2024)
by: Khoo, Zong Zheng
Published: (2024)
FAQ Automated Information System (FAQAIS) development by applying keyword based information retrieval technique / Irsyad Aljuhari Ismail Aljuhari
by: Ismail Aljuhari, Irsyad Aljuhari
Published: (2017)
by: Ismail Aljuhari, Irsyad Aljuhari
Published: (2017)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
Similar Items
-
PhishWHO: Phishing webpage detection via identity keywords
extraction and target domain name finder
by: Tan, Choon Lin, et al.
Published: (2016) -
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023) -
Phishing detection via identification of website identity
by: Ee, Hung Chang, et al.
Published: (2013) -
Phishing Email Detection Technique by using Hybrid Features
by: Lew, May Form, et al.
Published: (2015) -
The effectiveness of url features on phishing emails classification using machine learning approach
by: Ahmad Fadhil Naswir,, et al.
Published: (2022)