- Open Access
A novel approach to protect against phishing attacks at client side using auto-updated white-list
© Jain and Gupta. 2016
- Received: 5 January 2016
- Accepted: 21 April 2016
- Published: 6 May 2016
Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low detection rate while other solutions like visual similarity and machine learning suffer from the fast access time. In this paper, we propose a novel approach to protect against phishing attacks using auto-updated white-list of legitimate sites accessed by the individual user. Our proposed approach has both fast access time and high detection rate. When users try to open a website which is not available in the white-list, the browser warns users not to disclose their sensitive information. Furthermore, our approach checks the legitimacy of a webpage using hyperlink features. For this, hyperlinks from the source code of a webpage are extracted and apply to the proposed phishing detection algorithm. Our experimental results show that the proposed approach is very effective for protecting against phishing attacks as it has 86.02 % true positive rate while less than 1.48 % false negative rate. Moreover, our proposed system is efficient to detect various other types of phishing attacks (i.e., Domain Name System (DNS) poisoning, embedded objects, zero-hour attack).
- Cyber security
- Social engineering
- DNS poisoning
Phishing is a cyber security threat which is performed with the help of social engineering techniques to trick Internet users into revealing personal and secret information . Detection and prevention of phishing attacks is a big challenge as the attacker performs these attacks in such a way that it can bypass the existing anti-phishing techniques [2, 3]. Moreover, sometimes an educated and experience user may also fall under this attack . In this attack, the attacker makes a fake webpage by copying or making a little change in the legitimate page, so that an internet user will not able to differentiate between phishing and legitimate webpages. One of the effective solutions to prevent a phishing attack is to integrate security features with the web browser which can raise the alerts whenever a phishing site is accessed by an internet user. Generally, web browsers provide security against phishing attacks with the help of list-based solutions. The list-based solutions contain either black-list or white-list. These list-based solutions match the given domain with the domains present in the black-list or white-list to take the appropriate decision [5, 6]. The combination of technical experts and security software verify when a new domain needs to be added in this list. Security software checks the various features of a webpage to verify identity .
According to the anti-phishing working report in the second half of 2014, 123,972 unique phishing attacks were found worldwide between July to December 2014 . E-commerce, banks, and money transfer companies are the most targeted industries by these attacks. Seventy-five percent of phishing websites used five top-level domains namely .com, .tk, .pw, .cf, and .net. The median uptime of phishing websites in the second half of 2014 increased to 10 h and 6 min (i.e., half of all phishing attacks stay active for slightly more than 10 h) . Internet services providers (ISPs) were the most targeted industry sector during the first three quarters of 2015, surpassing the banking and financial service sectors coming in second and third during the 9-month period . The attackers targeted Internet services providers because ISP account contains the identification details of users, credit card information, and secret information regarding the domain name [10, 11]. An attacker can also send the spam mail from the hacked user’s account. One of the major problems of 2015 is the Business Email Compromise (BEC) scam . In this scam, the attacker fools industries into transferring large amounts of money using spear-phishing techniques.
1.1 Phishing life cycle
Step 1: The attacker copies the content from the website of a well-known company or a bank and creates a phishing website. The attacker keeps a visual similarity of the phishing website similar to the corresponding legitimate website to attract more users.
Step 2: The attacker writes an email and includes the link of the phishing website and sends it to a large number of users. In the case of spear phishing, a mail is sent to only selected targeted users.
Step 3: The user opens the email and visits the phishing website. The phishing website asks the user to input personal information, for example, if the attacker mimics the phishing website of a well-known bank, then the users of bank are very likely to give up their credentials to the fake website.
Step 4: The attacker gets personal information of the user via the fake website and uses this information of the user for financial or some other benefits.
1.2 Phishing attack classification
The zero-hour phishing attack: A zero-hour vulnerability refers to a hole in anti-phishing technique that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it.
Embedded objects: A real webpage is downloaded to build the phishing webpage which appears just similar to a genuine webpage in appearance. Attackers cover the address bar by using an image or script which makes the online user believe that they have input to the right website. Attackers also use the embedded objects (flash, images, etc.) instead of HTML codes to avoid phishing detection techniques.
Domain Name System (DNS) attack: DNS cache poisoning exploits vulnerabilities in the domain name system. In this attack, attackers divert Internet traffic from the legitimate website to the phishing website.
Language dependent: Most of the anti-phishing techniques are based on heuristics, which include the keyword frequently appearing in the phishing website [13, 14]. If these techniques detect the keywords written in the English language, then they cannot detect other languages, e.g., Chinese, Hindi, Japanese, etc.
In this paper, we propose a novel approach against phishing attacks using auto-updated white-list of legitimate sites accessed by the individual user. A white-list is a set of approved legitimate domains or URLs. A white-list contains the information of those sites which are legitimate and the user wishes to access. On the other hand, a black-list contains the information of those sites which are fake and the user does not wish to access. Moreover, the white-list data is small and more accurate as compared to the black-list. In our proposed solution, the current domain is matched with predefined legitimate domains called white-list. If the user tries to open any website which is not available in the white-list, then our system checks the legitimacy of the website. Furthermore, our approach uses the hyperlink features which are extracted from the source code of a webpage to make the decision. After checking the legitimacy of a webpage using hyperlink features, the system updates the domain in the white-list. When the user accesses the same domain next time, the system only matches the domain name and IP address. Our proposed approach comprises two major components. (i) First is the domain and IP address matching module. This module matches the present domain and IP address in the white-list. Matching of IP address protects against DNS poisoning or pharming attacks. We use third-party DNS to match domain name with IP address. (ii) The second module runs if the domain is not matched with the white-list. This module examines the features from the hyperlinks to take the decision.
A practical and real-time technique is proposed which can protect a user from phishing attacks on client site effectively.
Detect the phishing attack by analysing only one effective feature (i.e., hyperlinks present in the webpage).
Detection of zero-hour phishing attack without any prior training.
DNS attack is also detected by matching the IP address of the suspicious site using Google Public DNS.
The remainder of this paper is organized as follows. Section 2 describes the background and previous anti-phishing approaches, their advantages and drawbacks. Section 3 presents the overview of our proposed approach and phishing detection algorithm. Section 4 presents the implementation detail, evaluation metrics, and results to judge the proposed anti-phishing system. We conclude the paper and present future scope in Section 5.
There have been several techniques given in the literature to detect phishing attacks. In this section, we present an overview of detection approaches against phishing attacks. In general, phishing detection techniques can be classified as either user education or software-based anti-phishing techniques. Software-based techniques can be further classified as list-based, heuristic-based [13–15], and visual similarity-based techniques .
List-based anti-phishing techniques maintain a black-list, white-list, or combination of both. In black-list-based anti-phishing approach, a black-list is maintained which contains suspicious domain names and IP addresses. Black-lists are frequently updated; however, most of the black-list-based approaches are not effective in dealing with zero-hour phishing attacks . Authors in  conclude that 47 % to 83 % of phishing domains update in the black-list after 12 h. Some of the approaches making use of black-lists are Google Safe Browsing API, DNS-based black-lists, and predictive black-listing. However, maintaining a black-list requires a great deal of resources for reporting and confirmation of the suspicious websites. As thousands of phishing webpages are created every day, updating every phishing webpage in the black-list is a challenging task. Some of the anti-phishing solutions given in the literature to protect user from phishing attacks are mentioned below:
Google provides a service for safe browsing  that allows the applications to verify the URLs using a list of suspicious domains which is regularly updated by Google. It is an experimental API but is used with Google Chrome and Mozilla Firefox, and it is very easy to use. The Safe Browsing Lookup API  allows the clients to send the suspicious URLs to Safe Browsing service which tells whether the URL is legitimate or malicious. The client API sends the URLs with GET or POST requests, which are checked using the malware and phishing lists provided by Google. Some of the shortcomings of Safe Browsing Lookup API are as follows: (i) no hashing is performed before sending URL and (ii) there is no limit on the response time by the lookup server.
A DNS-based blackhole list (DNSBL)  is a zone that contains resource records for the identification of hosts present in the black-list and uses the DNS protocol. The hosts undergo an IP address or domain name transformation to be encoded into DNSBL zones. There is an A record (for IPv4 address) and TXT record which gives the reason for black-listing for each entry in the DNSBL . The standard value of A record contents is 127.0.0.2, but they may have other values too. DNSBLs can use the same TXT records for all entries or a different for each entry. A single DNSBL can have both IPv4 and IPv6 addresses. Domain names are less frequently used by DNSBLs than the IP addresses. The interpretation of A records and TXT are the same as the interpretation of the IPv4 DNSBLs.
PhishNet  examines the black-listed URLs and used some heuristics to create new variations of that URL. The author replaced top-level domains (TLD) with 3209 different TLDs resulting into child URLs which are required to be examined. To generate new URLs, clusters of host equivalence classes having the same IP address are maintained, and all combinations of these hostnames and path are then used to create new URLs. The URLs with the same directory are grouped together, and the new URLs are created by exchanging filenames within that group. If two URLs have the same directory structure with different query parts, the query part can be swapped to create new URLs.
The automated individual white-list  keeps records of the legitimate Login User Interfaces (LUIs) of webpages. Whenever the user submits their credentials to LUI, the white-list is checked for it and if it is not on the list, then a warning is given to the user. AIWL has two primary components. First is the white-list of legitimate LUIs. It is used to check whether a URL is familiar or suspicious so that the warning is suppressed. In the white-list, each LUI is stored as a vector that comprises of URL address, webpage feature, DNS-IP mapping. The second component is the automated white-list maintainer: It is a naive Bayes classifier which decides whether to store an LUI in the white-list. The white-list maintainer checks the number of logins for a specific LUI, if it exceeds a certain threshold, then the LUI is white-listed. We borrow the idea of maintaining the white-list for individual users from this paper.
Liu et al.  proposed an anti-phishing technique using visual features. This technique compares the visual similarity between the current site and the stored legitimate website. The proposed approach has taken a variety of visual features for comparison. To detect a phishing website, the system consists of two modules. The first module runs on the local server to detect suspicious URLs and keywords from email. The second module compares the visual similarity between the suspicious webpage and stored genuine webpage.
Liu et al.  present an approach which can detect the zero-hour phishing attack. The system extracts directly associated webpage and indirectly associated webpage. Directly associated webpages are extracted using the hyperlinks present in the source code of a webpage. Most frequent keywords (using the term frequency-inverse document frequency (TF-IDF) algorithm) including title word are searched using a reliable search engine to extract indirectly associated webpages. After extracting directly and indirectly associated webpage, the system compares the suspicious webpage with the associated webpage using link relation, ranking relation, text similarity, and layout similarity relations.
Zhang et al.  proposed a content-based phishing detection technique called CANTINA, which takes feature set from various fields of a webpage. The proposed technique calculates TF-IDF of the content of a website and creates a lexical signature. Then, the top five terms with highest TF-IDF values are submitted to the search engine. The top “n” results are used to check the legitimacy of a website, though the performance of CANTINA is affected by the language used in the website.
Xiang et al.  present CANTINA+, an effective, rich feature-based machine learning approach to detect phishing webpages. The rich features are taken from the various field of a webpage like Document Object Model (DOM) tree and the URL of a website. They filtered the website without login forms in the first step to decrease false positive rate. CANTINA+ achieved a true positive rate of 92 % and a false positive rate of 0.4 %.
Reddy et al.  present an anti-phishing technique which protects user at client side against phishing attacks. The proposed technique provides facility for the user to select specific image corresponding to every website he/she visits. Next time, when a user visits the same website and if the images do not match, then the system will alert the user. However, maintaining the image database required a lot of memory, and matching the images of suspicious sites with the stored images required a lot of time.
In a real-time environment, the detection of a phishing attack should be effective and very fast. Black-list-based approaches are very fast, but they cannot detect the zero-hour phishing attack. Visual similarity-based approaches are time consuming, require a lot of memory, and fail to detect the zero-hour attack. Heuristic-based approaches can detect zero-hour attack but their performance depends on the feature set, training data, and classifier [25, 26]. Therefore, in this paper, we proposed an approach based on auto-updated white-list to protect against phishing attacks effectively.
In this section, we will discuss our proposed phishing detection system.
Phishing webpages always have the same visual designs as their corresponding real websites because visual style is the most important characteristic, which is observed by a maximum number of users. However, a phishing webpage does not provide services similar to the corresponding legitimate webpage. An attacker can download the real webpage to build the phishing webpage. The phishing webpage may contain some links which redirect the users to the corresponding legitimate webpage (i.e., if a user finds any difficulty to access his/her account, he/she click on a help link then the webpage may redirect to the help section of the targeted legitimate webpage). To verify the hyperlinks relation, we have checked over 1120 phishing webpages taken from PhishTank  and found that 410 webpages contain direct hyperlinks to their legitimate source page.
3.1 System architecture
3.2 Phishing detection algorithm
3.2.1 Webpage that does not contain any hyperlinks
<a href="serversite.php?id=1234">server site</a>
<frameset rows="0,* border="0">
<frame src="UntitledFrame-1" name="header" scrolling="no" noresize target="main">
<frame name="main" src="cadastro.php">
From our analysis, we have seen that if the website is legitimate, we can extract at least one hyperlink. In addition, if the total links extracted from the page source are zero, then it shows that the website is a phishing site. Therefore, our phishing detection algorithm declares the webpage as phishing if no hyperlink is extracted from the page source.
3.2.2 Webpage that contains null pointer
The first reason is to create the live hyperlink which goes nowhere. A genuine website contains lots of webpages, but a fake website contains very limited webpages. Therefore, to pretend like the legitimate webpage, the attacker creates a fake webpage and put the null values in hyperlinks. When the user scrolls the mouse over the null links, it seems that they are active.
<a href="#" onClick="location.href=unescape (‘http://firstname.lastname@example.org’);" onMouseOver="window.status='example1.org';return true;" onMouse Out="window.status='';return false;">This is the hyperlink Text </a>
Therefore, our phishing detection algorithm can declare the webpage as phishing if most of the hyperlinks (greater then threshold) extracted from the page source are NULL.
3.2.3 Number of links pointing to own domain and foreign domain
where ND i is the total number of links pointing to the own domain and ∑L is the total number of links extracted from the page source of the suspicious webpage.
3.3 Records in the white-list
In the proposed approach, two records are kept in the white-list. First is the domain name and another is the IP address of the corresponding domain name. Whenever a user accesses the webpage for first time, the identity of the webpage is checked by the hyperlink relationship to make the decision. After making the decision, if the website is legitimate, then the system stores the detail in the white-list. Next time, when the user accesses the same domain name, the system extracts the IP address corresponding to that and matching is performed. We extract the IP address from the third party to protect the user from the DNS poisoning attack.
3.4 Third-party services
DNS cache poisoning exploits vulnerabilities in the domain name system. In this attack, hackers divert Internet traffic from the legitimate website to the phishing website. DNS is a distributed database because it becomes complex when all the Internet information is stored in a single place. To speed up the performance, one server caches the recently queried data from another server. ISP, home router, and user’s personal computer also maintain the DNS cache, so they can also solve the DNS query rather than refer to DNS server again and again for the same information. Whenever the user’s computer contacts to a domain name like “paypal.com,” a DNS resolver contacts to the nearest DNS server. The DNS server responds with an IP address. The user’s computer then connects directly to that numerical IP address corresponding to paypal.com. An attacker can change the information in the DNS cache and makes it poisoned. If the attacker gets control over DNS server and change some information, e.g., an attacker changed the IP address corresponding to paypal.com and put its own website IP address which is a phishing website, then the attacker gets all the information input by the user. In this attack, an Internet user always sees the correct URL in the web browser. Our phishing detection system compares the IP address of a suspicious site after matching the domain name. We retrieve the target’s IP address by performing DNS lookup. The purpose of using DNS lookup is to resolve the issue of DNS poisoning as sometimes the attacker changes the entry in DNS cache. Attempting to match these two IP addresses will reduce the false negative rate.
In this section, we will discuss implementation details and experimental results of our proposed phishing detection system. Our proposed system can provide the personal protection for Internet users as a browser plug-in for accessing the websites at the client side. When the user input any URL in the web browser, our phishing detection system declares the URL as either phishing or legitimate.
4.1 Tool used
Our phishing detection system is implemented in Java platform standard edition 7 (JDK 1.7). It takes the URL of the suspicious webpage as an input to checks its legitimacy. The parent domain of the input URL is checked with the white-list. If the suspicious webpage comes out as a phishing one, the system gives warning to the user. The hyperlinks present in the webpage are extracted using Jsoup  by parsing the HTML file of the webpage, and a pattern matching scheme is used to obtain the links from the webpages which are not well formed. We have used Guava libraries  to find out the parent domains of the hyperlinks. The IP addresses of the parent domains of the suspicious webpages are found using Google Public DNS . Then, the legitimacy of the suspicious webpage is verified by comparing both stored and extracted IP addresses. If Google Public does not find any IP address corresponding to the domain, then we can declare the webpage as phishing.
4.2 Dataset used
Database uses to test system
Number of URLs
URL of dataset
Online payment service provider
4.3 Evolution metrics
We have calculated the true positive rate, false positive rate, true negative rate, false negative rate, and accuracy of our phishing detection system. These are the standard metrics to judge any phishing detection system. Let N L denote the total number of legitimate websites and N P denote the total number of phishing websites. Now, N L→L are the legitimate websites classified as legitimate, and N L→P are the legitimate websites misclassified as phishing. N P→P are the phishing websites classified as phishing and N P→L are the phishing websites misclassified as legitimate. Performance of a phishing webpage detection system can be evaluated in the following manner:
4.4 Experiment results and discussion
Various experiments are performed to evaluate the performance of our proposed phishing detection system. We also compared our proposed system with other popular and standard anti-phishing approaches. Our system can detect the phishing webpage based on hyperlinks information. The overall true positive rate of the system is 86.02 % and false negative rate is 1.48 %.
Ratio of hyperlinks pointing to a foreign domain versus total hyperlinks
Phishing webpages (%)
Legitimate webpages (%)
Details of the hyperlink features
No. of webpages that contain no hyperlinks
No. of webpages that contain null links
No. of webpages pointing to a foreign domain (≥ threshold)
Selection of the appropriate threshold to detect more number of phishing websites is a challenging task. Our aim is to design a system in which true positive rate should be high and false negative rate should be as minimum as possible. If a threshold increases, then the false negative rate decreases but at the same time, the true positive rate also decreases. Moreover, if we decrease the threshold, then the true positive rate increases but the false negative rate also increases. A good anti-phishing system requires both low false negative rate and high true positive rate. We checked it manually and adjusted the threshold to 36 %.
Results of our anti-phishing system
Phishing website classified as phishing
Phishing website classified as legitimate
Legitimate website classified as legitimate
Legitimate website classified as phishing
True positive rate
False negative rate
Comparison between anti-phishing solutions
PhishNet: predictive black-listing 
DNS-based black-list (DNSBL) 
Automated individual white-list 
Visual signature 
Automatic detection of phishing target 
Although our proposed approach is very effective in dealing with the verity of phishing attacks, however, some of the recommendations are mentioned below which can be explored in the future to enhance the performance of the system.
Our phishing detection algorithm works on hyperlink features. Accuracy of detection can be improved by adding certain more features. However, extracting other features from the page source will increase the running time complexity of the system. Moreover, some features (e.g., age of domain) also required the third-party services which are not reliable. Secondly, the accuracy of detection may improve by using the machine learning to train hyperlink features instead of the phishing detection algorithm. However, using the machine learning algorithm, reliable labeled dataset is required and performance of the system depends on the learning algorithm.
In this paper, we proposed a novel approach to protect against phishing attack using auto-updated white-list of legitimate sites accessed by the individual user. Furthermore, our approach is able to check the legitimacy of a webpage using hyperlink features. Our experimental results showed that the proposed approach is very effective in protecting against phishing attacks as it has 86.02 % true positive rate with a very less false positive rate of 1.48 %. Moreover, our proposed system is efficient to detect various other types of phishing attacks (i.e., DNS poisoning, embedded objects, zero-hour attack). Moreover, our approach is suitable for a real-time environment. In the future, the performance of the proposed system can be improved by taking the other features along with the hyperlinks; however, extracting other features will increase the running time complexity of the system.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- A Almomani, BB Gupta, S Atawneh, A Meulenberg, E ALmomani, A survey of phishing email filtering techniques. IEEE Commun. Surv. Tutorials 15(4), 2070–2090 (2013)View ArticleGoogle Scholar
- A Mishra, BB Gupta, Hybrid solution to detect and filter zero-day phishing attacks, in proceeding of Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Bangalore, India, August 2014Google Scholar
- K Parsons, A McCormac, M Pattinson, M Butavicius, C Jerram, The design of phishing studies: challenges for researchers. Comput. Secur. (2015). doi:10.1016/j.cose.2015.02.008
- S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, and E Nunge, Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish, in Proceedings of the 3rd symposium on Usable privacy and security, July 18-20, Pittsburgh, Pennsylvania, 2007 pp. 88-99Google Scholar
- A Tewari, AK Jain, and BB Gupta, Recent survey of various defense mechanisms against phishing attacks. J. Inf. Privacy Sec. 1-11. 12(1), 3–13 (2016)Google Scholar
- BB Gupta, A Tewari, AK Jain, and DP Agrawal, Fighting against phishing attacks: state of the art and future challenges. Neural Comput. & Applic. 1-26 (2016). doi:10.1007/s00521-016-2275-y
- G Xiang, J Hong, C Rose, L Cranor, Cantina+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur (TISSEC) 14(2), Article no. 21 (2011)View ArticleGoogle Scholar
- APWG report available at: http://www.antiphishing.org/download/document/245/APWG_Global_Phishing_Report_2H_2014.pdf. Accessed 30 Nov 2015.
- APWG Q1-Q3 2015 Report available at: http://docs.apwg.org/reports/apwg_trends_report_q1-q3_2015.pdf. Accessed 7 Mar 2016.
- RM Saad, A Almomani, A Altaher, BB Gupta, S Manickam, ICMPv6 flood attack detection using DENFIS algorithms. Indian J. Sci. Technol. 7(2), 168–173 (2014)Google Scholar
- Alomari, Esraa, Selvakumar Manickam, BB Gupta, Prashant Singh, and Mohammed Anbar, Design, deployment and use of HTTP-based botnet (HBB) testbed, in Advanced Communication Technology (ICACT), 2014 16th International Conference on, pp. 1265-1269. IEEE, 2014Google Scholar
- A Almomani, BB Gupta, T Wan, A Altaher, Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-Day Phishing Email. Indian J. Sci. Technol. 6, no. 1, 3960–3964 (2013)Google Scholar
- M Moghimi, AY Varjani, New rule-based phishing detection method. Expert Syst. Appl. 53, 231–242 (2016)View ArticleGoogle Scholar
- R Gowtham, I Krishnamurthi, A comprehensive and efficacious architecture for detecting phishing webpages. Comput. Secur. 40, 23–37 (2014)View ArticleGoogle Scholar
- GA Montazer, S Yarmohammadi, Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system. Appl. Soft Comput. 35, 482–492 (2015)View ArticleGoogle Scholar
- W Liu, X Deng, G Huang, AY Fu, An antiphishing strategy based on visual similarity assessment. IEEE Internet Comput. 10(2), 58–65 (2006)View ArticleGoogle Scholar
- S Sheng, B Wardman, G Warner, L Cranor, J Hong, and C Zhang, An empirical analysis of phishing black-lists, in Proceeding of the Sixth Conference on Email and Anti-Spam, CEAS, 2009Google Scholar
- Google safe browsing API Available at: https://developers.google.com/safe-browsing/. Accessed 30 Nov 2015.
- DNSBL Information - Spam Database Lookup. Available at http://www.dnsbl.info. Accessed 1 May 2016
- P Prakash, M Kumar, RR Kompella, and M Gupta, Phishnet: predictive black-listing to detect phishing attacks, in proceedings of the 29th conference on information communications. Piscataway, NJ, USA, pp. 346–350, 2010Google Scholar
- Y Cao, W Han, and Y Le, “Anti-phishing based on automated individual white-list,” in proceedings of the 4th ACM Workshop on Digital Identity Management, New York, NY, USA: ACM, pp. 51–60, 2008Google Scholar
- G Liu, B Qiu and L Wenyin, “Automatic detection of phishing target from phishing webpage,” in proceeding of 20th International Conference on Pattern Recognition (ICPR), pp. 4153-4156, 2010Google Scholar
- Y Zhang, J Hong and L Cranor, CANTINA: a content-based approach to detecting phishing websites, in Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Alberta, Canada, May 8-12, pp. 639-648, 2007Google Scholar
- VP Reddy, V Radha, M Jindal, Client side protection from phishing attack. Int J adv. Eng. Sci. Technol. 3(1), 039–045 (2011)Google Scholar
- A Jain, BB Gupta, PHISH-SAFE: URL features based phishing detection system using machine learning, in proceeding of CSI-2015, New Delhi, India, December 2015Google Scholar
- V Ramanathan, H Wechsler, phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training. EURASIP J Inf Security Security 2012(1), 1–22 (2012)View ArticleGoogle Scholar
- Verified Phishing URL Available at : https://www.phishtank.com. Accessed 30 Nov 2015.
- Jsoup HTML parser, Available at: http://jsoup.org/apidocs/org/jsoup/parser/Parser.html. Accessed 30 Nov 2015.
- Guava libraries, Google Inc., Available at: https://github.com/google/guava. Accessed 30 Nov 2015.
- Google Public DNS, Available at: https://developers.google.com/speed/public-dns/. Accessed 30 Nov 2015.
- Alexa Top 500 sites, Available at: http://www.alexa.com/topsites. Accessed 30 Nov 2015.
- Stuffgate Top 1000 sites, Available at: http://stuffgate.com/stuff/website/top-1000-sites. Accessed 30 Nov 2015.