Decisive heuristics to differentiate legitimate from phishing sites

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Phishing attacks are a major concern for preserving Internet users privacy, especially when most of them lead to financial data theft by combining both social engineering and spoofing techniques. As blacklists are not the most effective in detecting phishing sites because of their short lifetime, heuristics appears as a privileged way at time 0. Several previous studies discussed the different types of phishing characteristics that can help defining heuristics tests, as well as comparing them to blacklists. In our paper, we studied heuristics using a different approach. Based on the characteristics of phishing URLs and webpages, we defined 20 heuristics tests and implemented them in our own active anti-phishing toolbar (Phishark). Then, we tested the heuristics effectiveness and determined which heuristics are decisive to differentiate legitimate from phishing sites.

Original languageEnglish
Title of host publication2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
DOIs
Publication statusPublished - 1 Aug 2011
Externally publishedYes
Event2011 Conference on Network and Information Systems Security, SAR-SSI 2011 - Ile de Re, La Rochelle, France
Duration: 18 May 201121 May 2011

Publication series

Name2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings

Conference

Conference2011 Conference on Network and Information Systems Security, SAR-SSI 2011
Country/TerritoryFrance
CityIle de Re, La Rochelle
Period18/05/1121/05/11

Fingerprint

Dive into the research topics of 'Decisive heuristics to differentiate legitimate from phishing sites'. Together they form a unique fingerprint.

Cite this