Research of phishing detection technology

The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matc...

Full description

Bibliographic Details
Main Authors: Xi ZHANG, Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-07-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180
_version_ 1828809943386423296
author Xi ZHANG
Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
author_facet Xi ZHANG
Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
author_sort Xi ZHANG
collection DOAJ
description The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.
first_indexed 2024-12-12T09:04:24Z
format Article
id doaj.art-3109da7f9a274d9cbb07ec8fef953755
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-12-12T09:04:24Z
publishDate 2017-07-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-3109da7f9a274d9cbb07ec8fef9537552022-12-22T00:29:42ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013772410.11959/j.issn.2096-109x.2017.00180Research of phishing detection technologyXi ZHANG0Zhi-wei YAN,Hong-tao LI,Guang-gang GENG1Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China ; University of Chinese Academy of Sciences,Beijing 100049,China ; National Engineering Laboratory for Internet Domain Name Management,China Internet Network Information Center,Beijing 100190,ChinaNational Engineering Laboratory for Internet Domain Name Management,China Internet Network Information Center,Beijing 100190,ChinaThe current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180phishing fraudphishing detectionmachine learningvisual matching
spellingShingle Xi ZHANG
Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
Research of phishing detection technology
网络与信息安全学报
phishing fraud
phishing detection
machine learning
visual matching
title Research of phishing detection technology
title_full Research of phishing detection technology
title_fullStr Research of phishing detection technology
title_full_unstemmed Research of phishing detection technology
title_short Research of phishing detection technology
title_sort research of phishing detection technology
topic phishing fraud
phishing detection
machine learning
visual matching
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180
work_keys_str_mv AT xizhang researchofphishingdetectiontechnology
AT zhiweiyanhongtaoliguangganggeng researchofphishingdetectiontechnology