Research of phishing detection technology
The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matc...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-07-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180 |
_version_ | 1828809943386423296 |
---|---|
author | Xi ZHANG Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
author_facet | Xi ZHANG Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
author_sort | Xi ZHANG |
collection | DOAJ |
description | The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed. |
first_indexed | 2024-12-12T09:04:24Z |
format | Article |
id | doaj.art-3109da7f9a274d9cbb07ec8fef953755 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-12-12T09:04:24Z |
publishDate | 2017-07-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-3109da7f9a274d9cbb07ec8fef9537552022-12-22T00:29:42ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013772410.11959/j.issn.2096-109x.2017.00180Research of phishing detection technologyXi ZHANG0Zhi-wei YAN,Hong-tao LI,Guang-gang GENG1Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China ; University of Chinese Academy of Sciences,Beijing 100049,China ; National Engineering Laboratory for Internet Domain Name Management,China Internet Network Information Center,Beijing 100190,ChinaNational Engineering Laboratory for Internet Domain Name Management,China Internet Network Information Center,Beijing 100190,ChinaThe current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180phishing fraudphishing detectionmachine learningvisual matching |
spellingShingle | Xi ZHANG Zhi-wei YAN,Hong-tao LI,Guang-gang GENG Research of phishing detection technology 网络与信息安全学报 phishing fraud phishing detection machine learning visual matching |
title | Research of phishing detection technology |
title_full | Research of phishing detection technology |
title_fullStr | Research of phishing detection technology |
title_full_unstemmed | Research of phishing detection technology |
title_short | Research of phishing detection technology |
title_sort | research of phishing detection technology |
topic | phishing fraud phishing detection machine learning visual matching |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00180 |
work_keys_str_mv | AT xizhang researchofphishingdetectiontechnology AT zhiweiyanhongtaoliguangganggeng researchofphishingdetectiontechnology |