Defending the weakest link: phishing websites detection by analysing user behaviours

@article{Dong2010DefendingTW,
  title={Defending the weakest link: phishing websites detection by analysing user behaviours},
  author={Xun Dong and John A. Clark and Jeremy L. Jacob},
  journal={Telecommunication Systems},
  year={2010},
  volume={45},
  pages={215-226}
}
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites based on analysis of users’ online behaviours— i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be manipulated freely by attackers; detection based on those data can achieve high accuracy whilst being fundamentally resilient against changing… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 31 references

The phishing guide (Technical report). NGSS

G. Ollmann
2009
View 1 Excerpt

Document object model events (Technical report)

B. Hhrmann, P. L. Htgaret, T. Pixley
2007
View 1 Excerpt

Enhancing one-time passwords for protection against real-time phishing attacks (Technical report)

R. Security
2007
View 1 Excerpt

Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks (Technical report)

T. McCall
2007
View 1 Excerpt

Human factors in phishing

M. Jakobsson
In Privacy & security of consumer information • 2007
View 1 Excerpt

Ietf-draft: requirements for web authentication resistant to phishing (Technical report)

S. Hartman
2007
View 1 Excerpt

Similar Papers

Loading similar papers…