A COMPARATIVE ANALYSIS AND AWARENESS SURVEY OF PHISHING DETECTION TOOLS

被引:0
作者
Sharma, Himani [1 ]
Meenakshi, Er. [1 ]
Bhatia, Sandeep Kaur [2 ]
机构
[1] Cent Univ Punjab, Ctr Comp Sci & Technol, Bathinda, Punjab, India
[2] Cent Univ Punjab, Ctr Econ Studies, Bathinda, Punjab, India
来源
2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT) | 2017年
关键词
Phishing; Phishing Detection Tools; Dataset;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to steal personal information of people. Nowadays various tools are freely available to detect phishing and other web-based scams, many of which are browser extensions that generate a warning whenever user browses a suspected phishing site. In this research paper, comparison of eight phishing detection tools has been done to find the best one by testing each tool on the dataset, and further an awareness survey was carried out about these tools. Dataset contains two thousand verified phishing websites reported from August 2016 to March 2017 collected from two anti-phishing platforms i.e., Anti-Phishing Working Group (APWG) and PhishTank, and 500 legitimate websites that are visited by users regularly (i.e., Citibank. com, PayPal. com, Alibaba. com, Askfm. in, etc.) to test the effectiveness of eight popular anti-phishing tools. After testing all the tools on the dataset, it is found that AntiPhishing Toolbar did a very good job at identifying 94.32 percent of phishing as well as legitimate websites from the dataset. An awareness survey has been conducted among fifty M. tech Computer Science & Technology, and Cyber Security pursuing students at Central University of Punjab. The survey revealed that approximately 61 percent respondents are completely unaware about phishing detection tools.
引用
收藏
页码:1437 / 1442
页数:6
相关论文
共 50 条
[41]   An Entice Resistant Automatic Phishing Detection [J].
Kordestani, Hossain ;
Shajari, Mehdi .
2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, :134-139
[42]   An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection [J].
Alnajim, Abdullah ;
Munro, Malcolm .
PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, :405-410
[43]   The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection [J].
Sturman, Daniel ;
Bell, Elliot A. ;
Auton, Jaime C. ;
Breakey, Georgia R. ;
Wiggins, Mark W. .
APPLIED ERGONOMICS, 2024, 119
[44]   Learning Model for Phishing Website Detection [J].
Suryan, A. ;
Kumar, C. ;
Mehta, M. ;
Juneja, R. ;
Sinha, A. .
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (27) :1-9
[45]   Use of HOG Descriptors in Phishing Detection [J].
Bozkir, Ahmet Selman ;
Sezer, Ebru Akcapinar .
2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, :148-153
[46]   A new method for Detection of Phishing Websites: URL Detection [J].
Parekh, Shraddha ;
Parikh, Dhwanil ;
Kotak, Srushti ;
Sankhe, Smita .
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, :949-952
[47]   A Framework for Detection and Measurement of Phishing Attacks [J].
Garera, Sujata ;
Provos, Niels ;
Chew, Monica ;
Rubin, Aviel D. .
WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, 2007, :1-8
[48]   Phishing Detection Using Ensemble of Classifiers [J].
Daza, David Raphael M. ;
Tabuco, Frank Cally A. ;
Naval, Prospero C., Jr. .
RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I, 2024, 2144 :39-50
[49]   Phishing detection on tor hidden services [J].
Steinebach, Martin ;
Zenglein, Sascha ;
Brandi, Katharina .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 36
[50]   PhAttApp: A Phishing Attack Detection Application [J].
Lam, Thuy ;
Kettani, Houssain .
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, :154-158