skip to main content
10.1145/1062745.1062868acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

Detection of phishing webpages based on visual similarity

Published: 10 May 2005 Publication History

Abstract

An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner can use this approach to search the Web for suspicious webpages which are visually similar to the true webpage. A webpage is reported as a phishing suspect if the visual similarity is higher than its corresponding preset threshold. Preliminary experiments show that the approach can successfully detect those phishing webpages for online use.

References

[1]
Anti-Phishing Working Group, http://www.antiphishing.org.
[2]
Chen Y., Ma W.Y., and Zhang H.J. Detecting webpage structure for adaptive viewing on small form factor devices. In Proceedings of the 12th International Conference on World Wide Web, pages 225-233, 2003.
[3]
Liu Y., Liu W., and Jiang C. User interest detection on webpages for building personalized information agent. In Proceedings of the Fifth International Conference on Web-Age Information Management (WAIM 2004), Dalian, China. LNCS, Vol. 3129, pages 280-287, 2004.
[4]
http://www.cs.cityu.edu.hk/~liuwy/phishing/testdata.zip

Cited By

View all

Recommendations

Reviews

Shannon Jacobs

Phishing is a label for certain strategies used by criminals to steal personal information via the Internet, and it is a rapidly growing problem. The classic approach involves using spam email containing "bait," typically some story about why the user should visit a Web site and "revalidate" their personal account information?while actually revealing that information in a counterfeit Web page created by the phisher. This report briefly summarizes three useful metrics the authors have evaluated for the detection of such counterfeit Web pages. The unstated premise is that this applies to phishers who are targeting "experienced" victims who have some familiarity with the authentic Web sites, so the visual similarity is critical to their phishing. (This premise is actually questionable, since experienced users are more likely to spot phishing attempts regardless of what the Web sites look like.) The main drawback of this report is that it doesn't present sufficiently detailed information about the results, but the limited space excuses that. A less serious (but less excusable) problem is that the English is significantly flawed, though most of the meaning can be teased out with a bit of interpretive effort. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '05: Special interest tracks and posters of the 14th international conference on World Wide Web
May 2005
454 pages
ISBN:1595930515
DOI:10.1145/1062745
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 May 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anti-phishing
  2. information filtering
  3. visual similarity
  4. web document analysis

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)44
  • Downloads (Last 6 weeks)6
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media