期刊文献+

基于图像相似性的钓鱼网站检测 被引量:5

Phishing-Website Detection based on Image Similarity
下载PDF
导出
摘要 钓鱼网站的泛滥,已经严重威胁到了网民的隐私和财产安全。现有保护措施主要是依靠域名黑名单进行风险提示,难以对未知的钓鱼网站进行实时有效地预警。本文提出了基于图像相似性的钓鱼网站检测方法,建立了"感知哈希指纹库",可对未知钓鱼网站进行实时检测与预警。 The phishing website in flood now constitutes frequent appearance of phishing websites has been a serious threat to the pri- vacy and property safety of Internet users. The existing protection measures mainly rely on domain blacklist for risk warning, but are difficult to warn users effectively and timely when unknown phishing website appear. A detection method based on image-similarity calculation for phishing website is proposed. With the "perceptual hash fingerprint database", the detection system could recognize un- known phishing websites in reahime and give users timely warning signs.
作者 卢康 周安民
出处 《信息安全与通信保密》 2016年第3期115-117,共3页 Information Security and Communications Privacy
关键词 钓鱼网站 图像相似性 感知哈希算法 phishing website image similarity perceptual hash
  • 相关文献

参考文献6

  • 1张慧..图像感知哈希测评基准及算法研究[D].哈尔滨工业大学,2009:
  • 2安坤..基于感知哈希算法的商标图像的检索[D].浙江理工大学,2014:
  • 3石敏..面向Web网页的自动化测试技术研究[D].东华大学,2014:
  • 4王光源..Web应用的自动化测试[D].山东大学,2006:
  • 5陈伟平..图像相似性计算及其GPU加速的若干研究[D].广东工业大学,2013:
  • 6黄华军,钱亮,王耀钧.基于异常特征的钓鱼网站URL检测技术[J].信息网络安全,2012(1):23-25. 被引量:44

二级参考文献20

  • 1Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15. 被引量:1
  • 2PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15. 被引量:1
  • 3Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561. 被引量:1
  • 4Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656. 被引量:1
  • 5Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84. 被引量:1
  • 6D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8. 被引量:1
  • 7Tyler Moore, Richard Clayton. The Impact of Incentives on Notice and Take-down[C]. In Proc. of the 7th Workshop on the Economics of Information Security, New Hampshire USA, June 25-28 2007: 1-24. 被引量:1
  • 8Christian Ludl, Sean McAUister, Engin Kirda,et al.. On the Effectiveness of Techniques to Detect Phishing Sites[C]. In Proc. of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Lucerne Switzerland, July 12-13 2007:20-39. 被引量:1
  • 9Steve Sheng, Brad Wardman, Gary Warner, et al.. An Empirical Analysis of Phishing Blacklists[C]. In Proc. of the sixth Conference on Email and Anti-Spare, California USA, July 16-17 2009. 被引量:1
  • 10Pawan Prakash, Manish Kumar, Ramana Rao Kompella, et al.. PhishNet: Predictive Blacklisting to Detect Phishing Attacks[C]. In Proc. of the IEEE INFOCOM, San Diego Canada, March 14-19 201011-5. 被引量:1

共引文献43

同被引文献18

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部