期刊文献+

基于匈牙利匹配算法的钓鱼网页检测方法 被引量:15

A Method of Detecting Phishing Web Pages Based on Hungarian Matching Algorithm
下载PDF
导出
摘要 如何快速有效地计算网页的相似性是发现钓鱼网页的关键.现有的钓鱼网页检测方法在检测效果上依然存在较大的提升空间.文中提出基于匈牙利匹配的钓鱼网页检测模型,该模型首先提取渲染后网页的文本特征签名、图像特征签名以及网页整体特征签名,比较全面地刻画了网页访问后的特征;然后通过匈牙利算法计算二分图的最佳匹配来寻找不同网页签名之间匹配的特征对,在此基础上能够更加客观地度量网页之间的相似性,从而提高钓鱼网页的检测效果.一系列的仿真实验表明文中方法可行,并具有较高的准确率和召回率. It is the key problem for detecting the phishing pages how to quickly and efficiently to calculate the similarity of web pages. There is still a large space to improve the detecting efficien- cy in current anti phishing method. A method of detecting phishing web pages based on bipartite graph matching is brought forward. In this model, the signature of text, the signature of images, and the signature of the overall web page are extracted. Then, by the Hungarian algorithm, the best match in the bipartite graph(signatures in different pages) is found. The pairs of features are then used to measure the similarity between pages in an more objective way, thereby the effec- tiveness of phishing page detection is improved. A series of simulation experiments show that this method is feasible with high precision and recall rate.
出处 《计算机学报》 EI CSCD 北大核心 2010年第10期1963-1975,共13页 Chinese Journal of Computers
基金 国家自然科学基金(60703086 60873050 60803008 60973046 苏州大学江苏省计算机信息处理技术重点实验室基金(KJS0714) 江苏省高校自然科学研究计划(09KJB520012)资助
关键词 钓鱼网页 网页特征 匈牙利匹配算法 相似性 网页签名 antiphishing web metric bipartite graph matching similarity web page signature
  • 相关文献

参考文献25

  • 1Abu-Nimeh S, Nappa D, Wang X, Nair S. A comparison of machine learning techniques for phishing detection//Proceedings of the eCrime Researchers Summit. Pittsburgh, PA, USA, 2007.60- 69.
  • 2Zhang Y, Hong J, Cranor L F. Cantina: A content based approach to detecting phishing web sites//Proceedings of the International Conference on World Wide Web. Banff, Alberta, Canada, 2007:639-648.
  • 3Kumaraguru P, Sheng S, Acquisti A, Cranor L F, Hong J. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 2010, 10(2): 1-31.
  • 4Sheng S, Holbrook M, Kumaraguru P, Cranor L F, Downs J. Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions//Proceedings of the 28th International Conference on Human Factors in Computing Systems. Atlanta, Georgia, USA, 2010. 373- 382.
  • 5Schneider F, Provos N, Moll, R, Chew, M, and Rakowski B. Phishing protection design documentation, http://wiki. mozilla, org/Phishing_ Protection: _ Design_ Documentation, 2007.
  • 6NetCraft. Netcraft Anti-Phishing tool bar. http:// toolbar. netcraft, corn, 2007.
  • 7McAfee. McAfee SiteAdvisor. http: //www. siteadvisor. corn, 2007.
  • 8Dhamija R, Tygar J D. The battle against phishing. Dynamic securityskins//Proceedings of the Symposium on Usable Privacy and Security. Pittsburgh, Pennsylvania, 2005:77-88.
  • 9Liu W, Huang G, Liu X, Zhang M, Deng X. Detection of phishing Web pages based on visual similarity//Proceedings of 14th International World Wide Web Conference. Chiba, Japan, 2005:1060-1061.
  • 10Liu W, Deng X, Huang G, Fu A Y. An anti-Phishing strategy based on visual similarity assessment. IEEE Internet Computing, 2006, 10(2): 58-65.

二级参考文献10

  • 1张恒博,欧宗瑛.一种基于色彩和灰度直方图的图像检索方法[J].计算机工程,2004,30(10):20-22. 被引量:40
  • 2Pan Ying, Ding Xuhua. Anomaly based Web phishing page detection//Proceedings of the 22nd Annual Computer Securi- ty Applications Conference. Washington, DC, USA, 2006: 381-393
  • 3Fu Anthony Y, L W, Deng Xiaotie. Detecting phishing Web pages with visual similarity assessment based on earth mov- er's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 301-311
  • 4Liu W, G H, Liu X, Zhang M, Deng X. Phishing Webpage deteetion//Proeeedings of the 8th International Conference on Documents Analysis and Recognition. Seoul, Korea, 2005:560-564
  • 5Nesbitt K V, Friedrich C. Applying gestalt principles to animated visualizations of network data//Proceedings of the 6th International Conference on Information Visualisation. Boston, USA, 2002:737-743
  • 6Kim Duck Hoon, Yun Il Dong, Lee Sang Uk. A new attributed relational graph matching algorithm using the nested structure of earth mover's distance//Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004). Cambridge, UK, 2004, 1:48-51
  • 7Dhamija Rachna, Tygar J D. The battle against phishing: Dynamic security skins//Proeeedings of the 2005 Symposium on Usable Privacy and Security Table of Contents. Pittsburgh, Pennsylvania, 2005:77-88
  • 8Inomata A, Rahman M, Okamoto T, Okamoto E. A novel mail filtering method against phishing//Proceedings of the Conference on Communications, Computers and signal Processing (PACRIM 2005), 2005:221-224
  • 9Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu Upadhyaya. PHONEY: Mimicking user response to detect phishing attacks//Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks Table of Contents. Washington, DC, USA: IEEE Computer Society, 2006:668-672
  • 10Choi Daeseon, Jin Seunghun, Yoon Hyunsoo. A method for preventing the leakage of the personal information on the Internet//Proeeedings of the 8th International Conference, Advanced Communication Technology. Korea, 2006, 2:20-22

共引文献12

同被引文献98

引证文献15

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部