Phishing attacks discovery based on HTML layout similarity
Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,fol...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539518046404608 |
---|---|
author | Xue-qiang ZOU Peng ZHANG Cai-yun HUANG Zhi-peng CHEN Yong SUN Qing-yun LIU |
author_facet | Xue-qiang ZOU Peng ZHANG Cai-yun HUANG Zhi-peng CHEN Yong SUN Qing-yun LIU |
author_sort | Xue-qiang ZOU |
collection | DOAJ |
description | Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates. |
format | Article |
id | doaj-art-7fe90dfd2ffd4c58aaf1cd544d1011fe |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-7fe90dfd2ffd4c58aaf1cd544d1011fe2025-01-14T07:11:13ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-013711612459706052Phishing attacks discovery based on HTML layout similarityXue-qiang ZOUPeng ZHANGCai-yun HUANGZhi-peng CHENYong SUNQing-yun LIUBased on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/layout similarityphishing attacktag sequence tree |
spellingShingle | Xue-qiang ZOU Peng ZHANG Cai-yun HUANG Zhi-peng CHEN Yong SUN Qing-yun LIU Phishing attacks discovery based on HTML layout similarity Tongxin xuebao layout similarity phishing attack tag sequence tree |
title | Phishing attacks discovery based on HTML layout similarity |
title_full | Phishing attacks discovery based on HTML layout similarity |
title_fullStr | Phishing attacks discovery based on HTML layout similarity |
title_full_unstemmed | Phishing attacks discovery based on HTML layout similarity |
title_short | Phishing attacks discovery based on HTML layout similarity |
title_sort | phishing attacks discovery based on html layout similarity |
topic | layout similarity phishing attack tag sequence tree |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/ |
work_keys_str_mv | AT xueqiangzou phishingattacksdiscoverybasedonhtmllayoutsimilarity AT pengzhang phishingattacksdiscoverybasedonhtmllayoutsimilarity AT caiyunhuang phishingattacksdiscoverybasedonhtmllayoutsimilarity AT zhipengchen phishingattacksdiscoverybasedonhtmllayoutsimilarity AT yongsun phishingattacksdiscoverybasedonhtmllayoutsimilarity AT qingyunliu phishingattacksdiscoverybasedonhtmllayoutsimilarity |