TY - GEN
T1 - Decisive heuristics to differentiate legitimate from phishing sites
AU - Gastellier-Prevost, Sophie
AU - Granadillo, Gustavo Gonzalez
AU - Laurent, Maryline
PY - 2011/8/1
Y1 - 2011/8/1
N2 - Phishing attacks are a major concern for preserving Internet users privacy, especially when most of them lead to financial data theft by combining both social engineering and spoofing techniques. As blacklists are not the most effective in detecting phishing sites because of their short lifetime, heuristics appears as a privileged way at time 0. Several previous studies discussed the different types of phishing characteristics that can help defining heuristics tests, as well as comparing them to blacklists. In our paper, we studied heuristics using a different approach. Based on the characteristics of phishing URLs and webpages, we defined 20 heuristics tests and implemented them in our own active anti-phishing toolbar (Phishark). Then, we tested the heuristics effectiveness and determined which heuristics are decisive to differentiate legitimate from phishing sites.
AB - Phishing attacks are a major concern for preserving Internet users privacy, especially when most of them lead to financial data theft by combining both social engineering and spoofing techniques. As blacklists are not the most effective in detecting phishing sites because of their short lifetime, heuristics appears as a privileged way at time 0. Several previous studies discussed the different types of phishing characteristics that can help defining heuristics tests, as well as comparing them to blacklists. In our paper, we studied heuristics using a different approach. Based on the characteristics of phishing URLs and webpages, we defined 20 heuristics tests and implemented them in our own active anti-phishing toolbar (Phishark). Then, we tested the heuristics effectiveness and determined which heuristics are decisive to differentiate legitimate from phishing sites.
UR - https://www.scopus.com/pages/publications/79960800504
U2 - 10.1109/SAR-SSI.2011.5931389
DO - 10.1109/SAR-SSI.2011.5931389
M3 - Conference contribution
AN - SCOPUS:79960800504
SN - 9781457707377
T3 - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
BT - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
T2 - 2011 Conference on Network and Information Systems Security, SAR-SSI 2011
Y2 - 18 May 2011 through 21 May 2011
ER -