期刊文献+

Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor 被引量:2

下载PDF
导出
摘要 Anti-detection is becoming as an emerging challenge for anti-phishing.This paper solves the threats of anti-detection from the threshold setting condition.Enough webpages are considered to complicate threshold setting condition when the threshold is settled.According to the common visual behavior which is easily attracted by the salient region of webpages,image retrieval methods based on texton correlation descriptor(TCD)are improved to obtain enough webpages which have similarity in the salient region for the images of webpages.There are two steps for improving TCD which has advantage of recognizing the salient region of images:(1)This paper proposed Weighted Euclidean Distance based on neighborhood location(NLW-Euclidean distance)and double cross windows,and combine them to solve the problems in TCD;(2)Space structure is introduced to map the image set to Euclid space so that similarity relation among images can be used to complicate threshold setting conditions.Experimental results show that the proposed method can improve the effectiveness of anti-phishing and make the system more stable,and significantly reduce the possibilities of being hacked to be used as mining systems for blockchain.
出处 《Computers, Materials & Continua》 SCIE EI 2018年第12期533-547,共15页 计算机、材料和连续体(英文)
基金 The work reported in this paper was supported by the Joint research project of Jiangsu Province under Grant No.BY2016026-04 the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University under Grant No.KFKT2018B27 the National Natural Science Foundation for Young Scientists of China under Grant No.61303263 the Jiangsu Provincial Research Foundation for Basic Research(Natural Science Foundation)under Grant No.BK20150201.
  • 相关文献

参考文献4

二级参考文献43

  • 1周明全,韦娜,耿国华.交互信息理论及改进的颜色量化方法在图像检索中的应用研究[J].小型微型计算机系统,2006,27(7):1331-1334. 被引量:5
  • 2WANG Wei,ZENG GuoSun.Trusted dynamic level scheduling based on Bayes trust model[J].Science in China(Series F),2007,50(3):456-469. 被引量:14
  • 3Abu-Nimeh S, Nappa D, Wang X, Nair S. A comparison of machine learning techniques for phishing detection//Proceedings of the eCrime Researchers Summit. Pittsburgh, PA, USA, 2007.60- 69.
  • 4Zhang Y, Hong J, Cranor L F. Cantina: A content based approach to detecting phishing web sites//Proceedings of the International Conference on World Wide Web. Banff, Alberta, Canada, 2007:639-648.
  • 5Kumaraguru P, Sheng S, Acquisti A, Cranor L F, Hong J. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 2010, 10(2): 1-31.
  • 6Sheng S, Holbrook M, Kumaraguru P, Cranor L F, Downs J. Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions//Proceedings of the 28th International Conference on Human Factors in Computing Systems. Atlanta, Georgia, USA, 2010. 373- 382.
  • 7Schneider F, Provos N, Moll, R, Chew, M, and Rakowski B. Phishing protection design documentation, http://wiki. mozilla, org/Phishing_ Protection: _ Design_ Documentation, 2007.
  • 8NetCraft. Netcraft Anti-Phishing tool bar. http:// toolbar. netcraft, corn, 2007.
  • 9McAfee. McAfee SiteAdvisor. http: //www. siteadvisor. corn, 2007.
  • 10Dhamija R, Tygar J D. The battle against phishing. Dynamic securityskins//Proceedings of the Symposium on Usable Privacy and Security. Pittsburgh, Pennsylvania, 2005:77-88.

共引文献32

同被引文献3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部