Method for detecting phishing webpage based on nearest neighbour and similarity measurement

A technology of phishing web pages and similarity, applied in the field of information security, can solve the problems of no consideration and failure of similarity detection, and achieve the effect of improving precision and recall rate, and saving program computing time and space.

Inactive Publication Date: 2011-08-31
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to Gesta's visual principle, relative position plays a major role in human vision, especially the relative positional relationship between multiple shapes. Changes in relative positional relationship will inevitably lead to visual differences, and the algorithm does not consider relative positional factors. May lead to failure of similarity detection, so this method can only detect web pages that are visually similar to real web pages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting phishing webpage based on nearest neighbour and similarity measurement
  • Method for detecting phishing webpage based on nearest neighbour and similarity measurement
  • Method for detecting phishing webpage based on nearest neighbour and similarity measurement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The implementation method requires the following steps:

[0022] Step 1) Collect phishing webpages, corresponding legal webpages and other legal webpage data sets

[0023] From the website http: / / www.phishtank.com / Collect phishing web pages; legal web pages corresponding to phishing web pages; ordinary other legitimate web pages.

[0024] Step 2) Extract features from the collected data

[0025] Save the collected web pages as pictures. From these pictures, you can extract various color features, texture features, shape features, and some SIFT (Scale-invariant feature transform) features that can be used locally.

[0026] Step 3) Calculate the land movement distance of the two pictures based on the features of the extracted webpage pictures.

[0027] Step 4) Use machine learning methods to train to obtain a threshold;

[0028] Step 5) After selecting the threshold, predict suspicious web pages.

[0029] The technical scheme of the present invention is specifically divided into thr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting a phishing webpage based on nearest neighbour and similarity measurement, which comprises the following steps: a picture of a whole image of a webpage is taken as a start point, and the characteristic of unchanged dimension conversion is extracted; similar characteristics at phishing webpage detection stage are quickly queried, and are then submitted to a machine leaning and matching module to carry out identification; the machine leaning and matching module extracts characteristic data transmitted during a system training stage to carry out training, so that a parameter of webpage similarity threshold can be optimized; during the phishing webpage detection stage, the characteristic data transmitted by the characteristic extracting module is received, the similarity between webpages is calculated, and finally, the phishing webpage is judged according to the webpage similarity threshold; in addition, a sorting method-Bayesian addable regression tree is added to predict suspicious webpages; and the characteristics during the phishing webpage detection process are extracted to be used as an evidence of the phishing webpage detection, so that the high accuracy can be ensured, and simultaneously, the webpage detection time can be remarkably reduced.

Description

Technical field [0001] The invention relates to a method for detecting phishing webpages, which mainly extracts feature values ​​from the overall visual characteristics of the webpage and performs corresponding feature value distance calculations to match and identify the phishing webpages, belonging to the field of information security. Background technique [0002] Phishing websites are online frauds that have become extremely rampant with the popularity of the Internet and the increase in online transactions. Phishing websites are scam websites made by criminals. Phishing websites are usually almost identical to bank websites or other well-known websites, thus enticing website users to submit sensitive information (such as usernames, passwords, bank accounts or credit cards) on phishing websites. Details, etc.) [Zhang2007]. [0003] figure 1 It is the architecture of the phishing website. The most typical phishing attack process is as follows: First, lure users to a phishing w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26G06F17/30
Inventor 张卫丰李涛贤周国强张迎周许碧欢陆柳敏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products