TITLE

Fighting Phishing with Discriminative Keypoint Features

AUTHOR(S)
Kuan-Ta Chen; Chun-Rong Huang; Chu-Song Chen; Jau-Yuan Chen
PUB. DATE
May 2009
SOURCE
IEEE Internet Computing;May/Jun2009, Vol. 13 Issue 3, p56
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web pages. Their invariant content descriptor, the Contrast Context Histogram (CCH), computes the similarity degree between suspicious and authentic pages. The results show that the proposed scheme achieves high accuracy and low error rates.
ACCESSION #
41033033

 

Related Articles

  • BLOCK DOES CCH OUTSOURCING.  // Accounting Technology;Mar2006, Vol. 22 Issue 2, p14 

    The article reports that the personnel in Specialty Tax Services Division of H&R Block Inc. will process the tax returns prepared by users of CCH ProSystem fx Outsource. CCH Access users can choose to send tax return data for preparation using ProSystem fx Tax to headquarters in Kansas City,...

  • Kaspersky Lab Anti-Phishing Module.  // Database & Network Journal;Oct2007, Vol. 37 Issue 5, p25 

    The article reflects on Kaspersky Lab's anti-phising module. According to the report, Kaspersky Lab announces that anti-phising databases provided by the Phish Tank service have been incorporated into the Anti-Phishing module of Kaspersky Internet Security 7.0. The system offers a consolidated...

  • LinkedIn Letting Sharks Into Corporate Waters.  // OfficePro;Jul2012, Vol. 72 Issue 4, p4 

    The article offers helpful tips to avoid spear phishing attacks in the social networking site LinkedIn. These include using common sense and available tools to avoid being victimized by hackers and connecting only with personally known persons. It also notes avoiding sharing confidential...

  • Avoid Identity Theft; Learn How to Recognize Phishing Scam.  // Employee Plans News;2016, Issue 13, p1 

    The article offers tips from the U.S. Internal Revenue Service (IRS) how to prevent or avoid identity theft. It states that the agency introduced the public awareness campaign called Taxes. Security, Together, as part of its Security Summit effort. Tips to determine and avoid a phishing e-mail...

  • Towards an Extra Layer of Security: The Cost of Two-Factor Authentication. Hari Om Prakash // Electronics For You;Mar2015, Vol. 3 Issue 11, p72 

    The article discusses the advantages of two-factor authentication (TFA) including the reduction of incidence of online identify theft, phishing expeditions and other online frauds, and increases the level of security. Disadvantages of TFA include the increase inconvenience to the user when...

  • Surfers beware sharks. King, Agnes; Hutton, Jeffrey // BRW;7/3/2008, Vol. 30 Issue 26, p42 

    The article discusses how banks and credit card companies in Australia are dealing with the sharp increase in so-called phishing websites overseas that are dedicated to stealing personal information. It describes how phishing scams work and the risks being posed by online fraud to lenders and...

  • Scared of identity thieves? Quinn, Jane Bryant // Good Housekeeping;Feb2006, Vol. 242 Issue 2, p92 

    The article offers information on how to prevent identity theft. It advises to rip financial records before disposing them and destroy the blank checks that come with solicitations for loans and credit cards. It is also important to take everything in the wallet that has the number printed on it...

  • PAYING BILLS ONLINE--SAFELY.  // Consumer Reports;Jul2007, Vol. 72 Issue 7, p7 

    The article offers advice on how to safely pay bills online. The article recommends that consumers pay through their bank rather than a third-party bill-paying service or the biller's web site. Consumers should create a fraud resistant password for online banking and bill-paying. Consumers...

  • Beyond Mom's Maiden Name, New Problems. Wolfe, Daniel // American Banker;6/7/2006, Vol. 171 Issue 108, p1 

    The article discusses the use of challenge questions in business and the problems which are being seen with its use. Challenge questions have been used for years by banks and other businesses to authenticate customers' identities online. The problem is that many businesses today are finding that...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics