{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:19:38Z","timestamp":1742973578350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415785"},{"type":"electronic","value":"9783030415792"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41579-2_44","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T16:09:09Z","timestamp":1581955749000},"page":"763-780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities"],"prefix":"10.1007","author":[{"given":"Zhaoyu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Lingjing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"44_CR1","unstructured":"Maxmind. https:\/\/www.maxmind.com\/en\/geoip2-databases"},{"key":"44_CR2","unstructured":"Phishtank. https:\/\/www.phishtank.com\/index.php"},{"key":"44_CR3","unstructured":"Phishing activity trends report. Technical report 2nd Quarter, APWG (2018)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Afroz, S., Greenstadt, R.: Phishzoo: detecting phishing websites by looking at them. In: IEEE ICSC, pp. 368\u2013375 (2011)","DOI":"10.1109\/ICSC.2011.52"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Blum, A., Wardman, B., Solorio, T., Warner, G.: Lexical feature based phishing url detection using online learning. In: ACM AISec Workshop, pp. 54\u201360 (2010)","DOI":"10.1145\/1866423.1866434"},{"key":"44_CR6","unstructured":"Borgolte, K., Kruegel, C., Vigna, G.: Meerkat: detecting website defacements through image-based object recognition. In: USENIX Security, pp. 595\u2013610 (2015)"},{"key":"44_CR7","unstructured":"Britt, J., Wardman, B., Sprague, A., Warner, G.: Clustering potential phishing websites using deepmd5. In: USENIX LEET (2012)"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: WWW Conference, pp. 197\u2013206 (2011)","DOI":"10.1145\/1963405.1963436"},{"issue":"3","key":"44_CR9","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: Libsvm: a library for support vector machines. ACM TIST 2(3), 27 (2011)","journal-title":"ACM TIST"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Chang, E.H., Chiew, K.L., Tiong, W.K., et al.: Phishing detection via identification of website identity. In: IEEE ICITCS, pp. 1\u20134 (2013)","DOI":"10.1109\/ICITCS.2013.6717870"},{"issue":"11","key":"44_CR11","first-page":"218","volume":"11","author":"H Choi","year":"2011","unstructured":"Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. WebApps 11(11), 218 (2011)","journal-title":"WebApps"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Corona, I., et al.: Deltaphish: detecting phishing webpages in compromised websites. In: ESORICS, pp. 370\u2013388 (2017)","DOI":"10.1007\/978-3-319-66402-6_22"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Shelly, D.: Goldphish: using images for content-based phishing analysis. In: IEEE ICIMP, pp. 123\u2013128 (2010)","DOI":"10.1109\/ICIMP.2010.24"},{"issue":"2","key":"44_CR14","first-page":"46","volume":"2015","author":"D Fifield","year":"2015","unstructured":"Fifield, D., Lan, C., Hynes, R., Wegmann, P., Paxson, V.: Blocking-resistant communication through domain fronting. PETS 2015(2), 46\u201364 (2015)","journal-title":"PETS"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: ACM workshop on Recurring malcode (2007)","DOI":"10.1145\/1314389.1314391"},{"issue":"10","key":"44_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"issue":"4","key":"44_CR17","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A., Faloutsos, M.: Phishdef: url names say it all. In: INFOCOM, pp. 191\u2013195 (2011)","DOI":"10.1109\/INFCOM.2011.5934995"},{"issue":"2","key":"44_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: DIMVA, pp. 20\u201339 (2007)","DOI":"10.1007\/978-3-540-73614-1_2"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM KDD, pp. 1245\u20131254 (2009)","DOI":"10.1145\/1557019.1557153"},{"issue":"10","key":"44_CR22","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TC.2017.2703808","volume":"66","author":"S Marchal","year":"2017","unstructured":"Marchal, S., Armano, G., Gr\u00f6ndahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66(10), 1717\u20131733 (2017)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"44_CR23","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TNSM.2014.2377295","volume":"11","author":"S Marchal","year":"2014","unstructured":"Marchal, S., Fran\u00e7ois, J., State, R., Engel, T.: Phishstorm: detecting phishing with streaming analytics. IEEE Trans. Netw. Serv. Manage. 11(4), 458\u2013471 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"331\u2013340","key":"44_CR24","first-page":"2","volume":"2","author":"M Muja","year":"2009","unstructured":"Muja, M., Lowe, D.G.: Fast approximate nearest neighbors with automatic algorithm configuration. VISAPP (1) 2(331\u2013340), 2 (2009)","journal-title":"VISAPP (1)"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: IEEE S&P, pp. 447\u2013462 (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Tian, K., Jan, S.T., Hu, H., Yao, D., Wang, G.: Needle in a haystack: tracking down elite phishing domains in the wild. In: ACM IMC, pp. 429\u2013442 (2018)","DOI":"10.1145\/3278532.3278569"},{"key":"44_CR27","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages (2010)"},{"issue":"2","key":"44_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: Cantina+: a feature-rich machine learning framework for detecting phishing web sites. ACM TISSEC 14(2), 1\u201328 (2011)","journal-title":"ACM TISSEC"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J.I.: A hybrid phish detection approach by identity discovery and keywords retrieval. In: WWW Conference, pp. 571\u2013580 (2009)","DOI":"10.1145\/1526709.1526786"},{"issue":"4","key":"44_CR30","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s11280-016-0418-9","volume":"20","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Jiang, Q., Chen, L., Li, C.: Two-stage ELM for phishing web pages detection using hybrid features. World Wide Web 20(4), 797\u2013813 (2017)","journal-title":"World Wide Web"},{"key":"44_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: WWW Conference, pp. 639\u2013648 (2007)","DOI":"10.1145\/1242572.1242659"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41579-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:33:40Z","timestamp":1606422820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41579-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415785","9783030415792"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41579-2_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"199","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}