Phishing with Discriminative Keypoint Features

نویسندگان

  • Kuan-Ta Chen
  • Chun-Rong Huang
چکیده

P hishing is a form of online identity theft associated with both social engineering and technical subterfuge. Specifically, phishers attempt to trick Internet users into revealing sensitive or private information, such as their bank account and credit-card numbers. Unwary users are often lured to browse counterfeit Web sites through spoofed email, and they might easily be convinced that fake pages with hijacked brand names are authentic. When users unwittingly browse phishing pages, phishers can plant crimeware, also known as malware, on the victims’ computers. Then, through this crimeware, phishers can steal users’ private information, redirect them to malicious sites directly, or redirect them to the intended Web sites by way of phisher-controlled proxies. The Anti-Phishing Working Group (APWG) reported that the number of phishing Web pages has increased by 28 percent a month since July 2004,1 and 5 percent of users who receive phishing emails respond to such scams, according to the APWG Web site (www.antiphishing.org). More than 55,000 cases of phishing were reported to, or detected by, the APWG in April 2007,1 and up to 95 percent of phishing targets were related to financial services and Internet retailers. According to a Gartner survey, in the US in 2007, more than $3.2 billion was lost due to phishing attacks on 3.6 million people.2 Phishing has thus become a Phishing is a form of online identity theft associated with both social

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fighting Phishing with Discriminative Keypoint Features of Webpages

Phishing is a form of online identity theft associated with both social engineering and technical subterfuge. As such, it has become a major threat to information security and personal privacy. According to Gartner Inc., in 2007, more than $3.2 billion was lost due to phishing attacks in the US, and 3.6 million people lost money in such attacks. In this article, we present an effective image-ba...

متن کامل

Phishing website detection using weighted feature line embedding

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

متن کامل

Using Biased Discriminant Analysis for Email Filtering

This paper reports on email filtering based on content features. We test the validity of a novel statistical feature extraction method, which relies on dimensionality reduction to retain the most informative and discriminative features from messages. The approach, named Biased Discriminant Analysis (BDA), aims at finding a feature space transformation that closely clusters positive examples whi...

متن کامل

Metric Learning Driven Multi-Task Structured Output Optimization for Robust Keypoint Tracking

As an important and challenging problem in computer vision and graphics, keypoint-based object tracking is typically formulated in a spatio-temporal statistical learning framework. However, most existing keypoint trackers are incapable of effectively modeling and balancing the following three aspects in a simultaneous manner: temporal model coherence across frames, spatial model consistency wit...

متن کامل

A Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection

Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009