CFP last date
20 January 2025
Reseach Article

Antiphishing Model with URL & Image based Webpage Matching

Published on March 2012 by Madhuri S. Arade, P.C. Bhaskar, R.K.Kamat
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 6
March 2012
Authors: Madhuri S. Arade, P.C. Bhaskar, R.K.Kamat
ea4ab9fe-f7b9-44de-88c5-d0bec5e02b64

Madhuri S. Arade, P.C. Bhaskar, R.K.Kamat . Antiphishing Model with URL & Image based Webpage Matching. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 6 (March 2012), 18-24.

@article{
author = { Madhuri S. Arade, P.C. Bhaskar, R.K.Kamat },
title = { Antiphishing Model with URL & Image based Webpage Matching },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 6 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 18-24 },
numpages = 7,
url = { /proceedings/icwet2012/number6/5353-1044/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Madhuri S. Arade
%A P.C. Bhaskar
%A R.K.Kamat
%T Antiphishing Model with URL & Image based Webpage Matching
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 6
%P 18-24
%D 2012
%I International Journal of Computer Applications
Abstract

Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and a major threat to information security and personal privacy. Many anti-phishing solutions, such as content analysis and HTML code analysis, rely on this property to detect fake web pages. However, these techniques failed, as phishers are now composing phishing pages with non-analyzable elements, such as images and flash objects. This paper proposes a new phishing detection scheme based on an URL domain identity & webpage image matching. At first, it identifies the similar authorized URL, using divide rule approach and approximate string matching algorithm. For this similar URL and input URL, the IP addresses will be identified. If their IP addresses doesn’t match with each other, then it could be phishing URL and phase-I phishing report will be generated. Then, this suspected URL’s webpage snapshot will be treated as an image during phase-II. In phase-II, keypoints will be detected and their features will be extracted. These features will be extracted using CCH descriptor. Then, match this suspected image features with the features of authorized webpage. If this matching crosses threshold value, then this webpage is phishing one. At last, final phishing report will be generated. As the combined approach of URL domain identity and webpage image matching used, it performs better than other existing tools.

References
  1. The Anti-Phishing Working Group,APWG Phishing Trends-Reports, www.antiphishing.org/phishReports Archive.html
  2. Jason Milletary, Technical Trends in Phishing Attacks, Carnegie Mellon University,2005
  3. Sumit Siddharth, Anti Spamming Techniques.pdf.
  4. P. Robichaux and D.L. Ganger, Gone Phishing: Evaluating Antiphishing Tools for Windows, 3Sharp Project Report, Sept. 2006; www.3sharp.com/ projects/antiphishing/.
  5. C. Ludl et al., On the Effectiveness of Techniques to Detect Phishing Sites, Proc. Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 4579, Springer, 2007, pp. 20–39
  6. W. Liu et al., An Antiphishing Strategy Based on Visual Similarity Assessment, IEEE Internet Computing, vol. 10, no. 2, 2006, pp. 58–65
  7. L. Wenyin et al., Detection of Phishing Webpages Based on Visual Similarity,Proc. World Wide Web Conf. (special interest tracks and posters), A. Ellis and T. Hagino, eds., ACM Press, 2005, pp. 1060–1061.
  8. IEEE 2009 Paper on Fighting Phishing with Discriminative Keypoint Features by K. J. Lin, Yan Wang.
  9. J. Han and M. Kamber,Data Mining: Concepts and Techniques, Morgan Kaufmann, 2000.
  10. C.-R. Huang, C.-S. Chen, and P.-4. C. Chung, ContrastContext Histogram — An Efficient Discriminating Local Descriptor for Object Recognition and Image Matching,Pattern Recognition, vol. 41, no. 10, 2008, pp.3071–3077; http://imp.iis.sinica.edu.tw/CCH/CCH.htm.
Index Terms

Computer Science
Information Sciences

Keywords

Phishing networking keypoints string matching image Matching