期刊文献+

网络钓鱼欺诈检测技术研究 被引量:12

Research of phishing detection technology
下载PDF
导出
摘要 分析了网络钓鱼欺诈的现状,并对钓鱼检测常用的数据集和评估指标进行了总结。在此基础上,综述了网络钓鱼检测方法,包括黑名单策略、启发式方法、视觉匹配方法、基于机器学习的方法和基于自然语言理解的方法等,对比分析了各类方法的优缺点,进一步指出了钓鱼检测面临的挑战,并展望了钓鱼检测未来的研究趋势。 The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried. On this basis, a detailed overview of the typical methods of phishing detection was given, which included blacklist strategies, heuristic methods, visual matching methods, and methods based on machine learning and natural language processing. The comparison and analysis of those methods were given, and furtherly, the challenges and future trends of phishing detection were discussed.
作者 张茜 延志伟 李洪涛 耿光刚 ZHANG Xi YAN Zhi-wei LI Hong-tao GENG Guang-gang(Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China University of Chinese Academy of Sciences, Beijing 100049, China National Engineering Laboratory for Internet Domain Name Management, China Internet Network Information Center, Beijing 100190, China)
出处 《网络与信息安全学报》 2017年第7期7-24,共18页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61375039)~~
关键词 网络钓鱼欺诈 钓鱼检测 机器学习 视觉匹配 phishing fraud phishing detection machine learning visual matching
  • 相关文献

参考文献10

二级参考文献149

  • 1张恒博,欧宗瑛.一种基于色彩和灰度直方图的图像检索方法[J].计算机工程,2004,30(10):20-22. 被引量:40
  • 2程克非,张聪.基于特征加权的朴素贝叶斯分类器[J].计算机仿真,2006,23(10):92-94. 被引量:40
  • 3Pan Ying, Ding Xuhua. Anomaly based Web phishing page detection//Proceedings of the 22nd Annual Computer Securi- ty Applications Conference. Washington, DC, USA, 2006: 381-393
  • 4Fu Anthony Y, L W, Deng Xiaotie. Detecting phishing Web pages with visual similarity assessment based on earth mov- er's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 301-311
  • 5Liu W, G H, Liu X, Zhang M, Deng X. Phishing Webpage deteetion//Proeeedings of the 8th International Conference on Documents Analysis and Recognition. Seoul, Korea, 2005:560-564
  • 6Nesbitt K V, Friedrich C. Applying gestalt principles to animated visualizations of network data//Proceedings of the 6th International Conference on Information Visualisation. Boston, USA, 2002:737-743
  • 7Kim Duck Hoon, Yun Il Dong, Lee Sang Uk. A new attributed relational graph matching algorithm using the nested structure of earth mover's distance//Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004). Cambridge, UK, 2004, 1:48-51
  • 8Dhamija Rachna, Tygar J D. The battle against phishing: Dynamic security skins//Proeeedings of the 2005 Symposium on Usable Privacy and Security Table of Contents. Pittsburgh, Pennsylvania, 2005:77-88
  • 9Inomata A, Rahman M, Okamoto T, Okamoto E. A novel mail filtering method against phishing//Proceedings of the Conference on Communications, Computers and signal Processing (PACRIM 2005), 2005:221-224
  • 10Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu Upadhyaya. PHONEY: Mimicking user response to detect phishing attacks//Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks Table of Contents. Washington, DC, USA: IEEE Computer Society, 2006:668-672

共引文献120

同被引文献57

引证文献12

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部