Phishing attacks discovery based on HTML layout similarity

Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,fol...

Full description

Saved in:
Bibliographic Details
Main Authors: Xue-qiang ZOU, Peng ZHANG, Cai-yun HUANG, Zhi-peng CHEN, Yong SUN, Qing-yun LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539518046404608
author Xue-qiang ZOU
Peng ZHANG
Cai-yun HUANG
Zhi-peng CHEN
Yong SUN
Qing-yun LIU
author_facet Xue-qiang ZOU
Peng ZHANG
Cai-yun HUANG
Zhi-peng CHEN
Yong SUN
Qing-yun LIU
author_sort Xue-qiang ZOU
collection DOAJ
description Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.
format Article
id doaj-art-7fe90dfd2ffd4c58aaf1cd544d1011fe
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-7fe90dfd2ffd4c58aaf1cd544d1011fe2025-01-14T07:11:13ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-013711612459706052Phishing attacks discovery based on HTML layout similarityXue-qiang ZOUPeng ZHANGCai-yun HUANGZhi-peng CHENYong SUNQing-yun LIUBased on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/layout similarityphishing attacktag sequence tree
spellingShingle Xue-qiang ZOU
Peng ZHANG
Cai-yun HUANG
Zhi-peng CHEN
Yong SUN
Qing-yun LIU
Phishing attacks discovery based on HTML layout similarity
Tongxin xuebao
layout similarity
phishing attack
tag sequence tree
title Phishing attacks discovery based on HTML layout similarity
title_full Phishing attacks discovery based on HTML layout similarity
title_fullStr Phishing attacks discovery based on HTML layout similarity
title_full_unstemmed Phishing attacks discovery based on HTML layout similarity
title_short Phishing attacks discovery based on HTML layout similarity
title_sort phishing attacks discovery based on html layout similarity
topic layout similarity
phishing attack
tag sequence tree
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016257/
work_keys_str_mv AT xueqiangzou phishingattacksdiscoverybasedonhtmllayoutsimilarity
AT pengzhang phishingattacksdiscoverybasedonhtmllayoutsimilarity
AT caiyunhuang phishingattacksdiscoverybasedonhtmllayoutsimilarity
AT zhipengchen phishingattacksdiscoverybasedonhtmllayoutsimilarity
AT yongsun phishingattacksdiscoverybasedonhtmllayoutsimilarity
AT qingyunliu phishingattacksdiscoverybasedonhtmllayoutsimilarity