An enhanced blacklist method to detect phishing websites

dc.contributor.authorRao, R.S.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-30T09:58:46Z
dc.date.available2020-03-30T09:58:46Z
dc.date.issued2017
dc.description.abstractExisting anti-phishing techniques like whitelist or blacklist detect the phishing sites based on the database of approved and unapproved URLs. Most of the current phishing attacks are actually replicas or variations of other attacks in the database. In this paper, we propose an enhanced blacklist method which uses key discriminate features extracted from the source code of the website for the detection of phishing websites. The main focus of our work is to detect the phishing sites which are replicas of existing websites with manipulated content. Each phishing website is identified with a unique fingerprint which is generated from the set of proposed features. We used Simhash algorithm to generate fingerprint for each website. The features used for calculating fingerprint are filenames of the request URLs (js, img, CSS, favicon), pathnames of request URLs (CSS, scripts, img, anchor links), and attribute values of tags (H1, H2, div, body, form). Our experimentation detected 84.36% of phishing sites as replicas of other phishing websites with manipulated content while maintaining zero false positive rate. The proposed method is similar to that of traditional blacklist with an advantage that it can detect replicated and manipulated phishing sites efficiently. � Springer International Publishing AG 2017.en_US
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, Vol.10717 LNCS, , pp.323-333en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/7291
dc.titleAn enhanced blacklist method to detect phishing websitesen_US
dc.typeBook chapteren_US

Files