Detecting Phishing Sites Using URLs Collected from Emails

2013 ◽  
Vol 479-480 ◽  
pp. 916-922
Author(s):  
Chuan Sheng Wang ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yan Ling Hwang ◽  
Min Hao Wu

Phishing is the malicious behavior of stealing personal information from computer users. It is a very popular account-theft-method among cyber criminals. Hence, developing a new approach to solve phishing attacks becomes an important issue. This paper proposes a router-based solution, called Shark, to phishing attacks. The router-based property allows Shark to protect a whole network without the need to install or maintain any software in any internal host. Based on the URLs collected from emails and the properties of the web pages pointed by these URLs, Shark quickly and automatically identifies phishing web pages. Experimental results demonstrate that Shark installed on a Linux edge router can accurately detect and attack phishing sites with low false positives and false negatives. And even though a false positive occurs, erroneous counterattacks do not influence the normal operations of legal web sites.

Cyber Crime ◽  
2013 ◽  
pp. 37-51
Author(s):  
Thomas M. Chen

Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be stolen through the Web. People can be lured to malicious Web sites designed to deceive them into revealing their personal information or unknowingly download malicious software to their computer. Even worse, legitimate sites can be compromised to host attacks called drive-by downloads. This chapter describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the Web.


2020 ◽  
pp. 143-158
Author(s):  
Chris Bleakley

Chapter 8 explores the arrival of the World Wide Web, Amazon, and Google. The web allows users to display “pages” of information retrieved from remote computers by means of the Internet. Inventor Tim Berners-Lee released the first web software for free, setting in motion an explosion in Internet usage. Seeing the opportunity of a lifetime, Jeff Bezos set-up Amazon as an online bookstore. Amazon’s success was accelerated by a product recommender algorithm that selectively targets advertising at users. By the mid-1990s there were so many web sites that users often couldn’t find what they were looking for. Stanford PhD student Larry Page invented an algorithm for ranking search results based on the importance and relevance of web pages. Page and fellow student, Sergey Brin, established a company to bring their search algorithm to the world. Page and Brin - the founders of Google - are now worth US$35-40 billion, each.


Author(s):  
Ravi P. Kumar ◽  
Ashutosh K. Singh ◽  
Anand Mohan

In this era of Web computing, Cyber Security is very important as more and more data is moving into the Web. Some data are confidential and important. There are many threats for the data in the Web. Some of the basic threats can be addressed by designing the Web sites properly using Search Engine Optimization techniques. One such threat is the hanging page which gives room for link spamming. This chapter addresses the issues caused by hanging pages in Web computing. This Chapter has four important objectives. They are 1) Compare and review the different types of link structure based ranking algorithms in ranking Web pages. PageRank is used as the base algorithm throughout this Chapter. 2) Study on hanging pages, explore the effects of hanging pages in Web security and compare the existing methods to handle hanging pages. 3) Study on Link spam and explore the effect of hanging pages in link spam contribution and 4) Study on Search Engine Optimization (SEO) / Web Site Optimization (WSO) and explore the effect of hanging pages in Search Engine Optimization (SEO).


Author(s):  
June Tolsby

How can three linguistical methods be used to identify the Web displays of an organization’s knowledge values and knowledge-sharing requirements? This chapter approaches this question by using three linguistical methods to analyse a company’s Web sites; (a) elements from the community of practice theory (CoP), (b) concepts from communication theory, such as modality and transitivity, and (c) elements from discourse analysis. The investigation demonstrates how a company’s use of the Web can promote a work attitude that actually can be considered as an endorsement of a particular organizational behaviour. The Web pages display a particular organizational identity that will be a magnet for some parties and deject others. In this way, a company’s Web pages represent a window to the world that need to be handled with care, since this can be interpreted as a projection of the company’s identity.


First Monday ◽  
1997 ◽  
Author(s):  
Steven M. Friedman

The power of the World Wide Web, it is commonly believed, lies in the vast information it makes available; "Content is king," the mantra runs. This image creates the conception of the Internet as most of us envision it: a vast, horizontal labyrinth of pages which connect almost arbitrarily to each other, creating a system believed to be "democratic" in which anyone can publish Web pages. I am proposing a new, vertical and hierarchical conception of the Web, observing the fact that almost everyone searching for information on the Web has to go through filter Web sites of some sort, such as search engines, to find it. The Albert Einstein Online Web site provides a paradigm for this re-conceptualization of the Web, based on a distinction between the wealth of information and that which organizes it and frames the viewers' conceptions of the information. This emphasis on organization implies that we need a new metaphor for the Internet; the hierarchical "Tree" would be more appropriate organizationally than a chaotic "Web." This metaphor needs to be changed because the current one implies an anarchic and random nature to the Web, and this implication may turn off potential Netizens, who can be scared off by such overwhelming anarchy and the difficulty of finding information.


2006 ◽  
Vol 4 (1) ◽  
pp. 64-74 ◽  
Author(s):  
Nsele Mengi Nsuangani ◽  
Miguel A. Pérez

This study explored college students’ online activities at health Web sites, their perceptions of the quality and accuracy of Internet medical information, and their concerns about Internet privacy and security. The research took place at a medium sized university in central California during the Fall 2002 semester with a sample of 136 students. The study found that 67% of the sampled students had sought health information on the Internet; 12% had used Internet medical consultations services; 7% had bought pharmaceutical products online; 2% had joined Internet health support groups; 7% had used e-mail to communicate with healthcare providers; 18% had sought second opinions online; 35% expressed serious concern about the accuracy of health information posted on the Web; and 53% were concerned about the privacy and security of personal information posted on the Web. Gender and age were identified as influential in some of the issues raised in the research.


Author(s):  
Nikhil K ◽  
Dr. Rajesh D S ◽  
Dhanush Raghavan

Phishing is one kind of cyber-attack , it is a most dangerous and common attack to retrieve personal information, account details, credit card credentials, organizational details or password of a client to conduct transactions. Phishing websites seem to like the relevant ones and it is difficult to differentiate among those websites. It is one of the most threatening that every individuals and organization faced. URLs are known as web sites are by which users locate information on the internet. The review creates warning of phishing attacks, detection of phishing attacks and motivate the practice of phishing prevention among the readers. With the huge number of phishing emails or messages received now days, companies or individuals are not able to find all of them.


2001 ◽  
Vol 20 (4) ◽  
pp. 11-18 ◽  
Author(s):  
Cleborne D. Maddux

The Internet and the World Wide Web are growing at unprecedented rates. More and more teachers are authoring school or classroom web pages. Such pages have particular potential for use in rural areas by special educators, children with special needs, and the parents of children with special needs. The quality of many of these pages leaves much to be desired. All web pages, especially those authored by special educators should be accessible for people with disabilities. Many other problems complicate use of the web for all users, whether or not they have disabilities. By taking some simple steps, beginning webmasters can avoid these problems. This article discusses practical solutions to common accessibility problems and other problems seen commonly on the web.


Author(s):  
Kai-Hsiang Yang

This chapter will address the issues of Uniform Resource Locator (URL) correction techniques in proxy servers. The proxy servers are more and more important in the World Wide Web (WWW), and they provide Web page caches for browsing the Web pages quickly, and also reduce unnecessary network traffic. Traditional proxy servers use the URL to identify their cache, and it is a cache-miss when the request URL is non-existent in its caches. However, for general users, there must be some regularity and scope in browsing the Web. It would be very convenient for users when they do not need to enter the whole long URL, or if they still could see the Web content even though they forgot some part of the URL, especially for those personal favorite Web sites. We will introduce one URL correction mechanism into the personal proxy server to achieve this goal.


IKON ◽  
2009 ◽  
pp. 151-175
Author(s):  
Sara Rigutti ◽  
Gisella Paoletti ◽  
Laura Blasutig

- We examined the consequences of a visualization pattern often chosen by web sites which show textual information within the web pages and the related iconic information within pop-up windows. The information visualization in pop-up windows aims to integrate text and pictures but makes difficult the analysis of both information resources. We conducted an experiment in which 80 participants read on a computer screen a text with embedded graphs either near (to the related textual information) or far (from it), plus graphs were integrated in the text or within pop-up windows. The reading behaviour of participants was observed to establish who, among them, examined the graphs and who did not. The recall for textual and iconic information was measured using a recall questionnaire. Our pattern of data shows a student's tendency to ignore graphs, in particular when they are visualized in pop-up windows. These results are confirmed by interviews to undergraduate students who analyzed the same materials using thinking aloud method.


Sign in / Sign up

Export Citation Format

Share Document