A SVM-based Technique to Detect Phishing URLs
نویسندگان
چکیده
منابع مشابه
LEARNING TO DETECT PHISHING URLs
Phishing attacks have been on the rise and performing certain actions such as mouse hovering, clicking, etc. on malicious URLs may cause unsuspecting Internet users to fall victims of identity theft or other scams. In this paper, we study the anatomy of phishing URLs that are created with the specific intent of impersonating a trusted third party to trick users into divulging personal data. Unl...
متن کاملLearning to Detect Phishing Webpages
Phishing has become a lucrative business for cyber criminals whose victims range from end users to large corporations and government organizations. Though Internet users are generally becoming more aware of phishing websites, cyber scammers come up with novel schemes that circumvent phishing filters and often succeed in fooling even savvy users. Recent studies to detect phishing and malicious w...
متن کاملSVM-OD: SVM Method to Detect Outliers
Outlier detection is an important task in data mining because outliers can be either useful knowledge or noise. Many statistical methods have been applied to detect outliers, but they usually assume a given distribution of data and it is difficult to deal with high dimensional data. The Statistical Learning Theory (SLT) established by Vapnik et aI. provides a new way to overcome these drawbacks...
متن کاملLightweight Phishing URLs Detection Using N-gram Features
Phishing is a kind of attack that belongs to social engineering and this attack seeks to trick people in order to let them reveal their confidential information. Several methods are introduced to detect phishing websites by using different types of features. Unfortunately, these techniques implemented for specific attack vector such as detecting phishing emails which make implementing wide scop...
متن کاملSVM Based Watermarking Technique
This paper presents a digital watermarking technique based on Support Vector Machines (SVMs). Use the nice characteristic of the SVM, which can result an optimal hyperplane for the given training samples, the imperceptibility and robustness requirements of watermarks are fulfilled and optimized. In the proposed scheme, to improve imperceptibility, the watermark is embedded by asymmetrically tun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2012
ISSN: 1812-5638
DOI: 10.3923/itj.2012.921.925