LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition

Computers & Security - Tập 95 - Trang 101855 - 2020
Ahmet Selman Bozkir1, Murat Aydos1
1Department of Computer Engineering, Hacettepe University, Ankara, Turkey

Tài liệu tham khảo

Alsarnouby, 2015, Why phishing still works: user strategies for combating phishing attacks, Int. Journal of Human-Computer Studies, 82 Asudeh, 2016, POSTER: phishing Website Detection with a Multiphase Framework to Find Visual Similarity APWG, Phishing activity trends paper. [Online]. Available at http://www/antiphishing.org/resources/apwg-papers/, 2018. Bay, 2008, "Speeded-up robust features (SURF), Computer vision and image understanding, vol.110, 346, 10.1016/j.cviu.2007.09.014 Bianco, 2017, Deep learning for logo recognition, Neurocomputing, 5, 23, 10.1016/j.neucom.2017.03.051 Bozkir, 2016, Use of HOG Descriptors in Phishing Detection Chen, 2009, Fighting Phishing with Discriminative Keypoint Features, IEEE Computer Society Chiew, 2015, Utilization of Website Logo for Phishing Detection, Computers & Security, 54, 16, 10.1016/j.cose.2015.07.006 Common Object in Context (COCO) Dataset, [Online], Available at http://cocodataset.org/#home, 2020. Corona, 2017, DeltaPhish: detecting Phishing Webpages in Compromised Websites, In European Symposium on Research in Computer Security, 370 Dalal, 2005, Histogram of Oriented Gradients for Human Detection, Computer Vision and Pattern Recognition Dalgic, 2018, Phish-IRIS: a New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors Dhamija, 2006, Why phishing works?, 581 Dunlop, 2010, GoldPhish: using images for content-based phishing analysis Felzenszwalb, 2010, Object Detection with Discriminatively Trained Part Based Models, IEEE Trans Pattern Anal Mach Intell, 32, 10.1109/TPAMI.2009.167 Firefox Browser, [Online], Available at https://www.mozilla.org, 2020. Fu, 2006, Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD), IEEE Trans Dependable Secure Comput, 3, 10.1109/TDSC.2006.50 Geng, 2015, Combatting phishing attacks via brand identity and authorization features, Security and Communication Networks, 8, 888, 10.1002/sec.1045 Girshick, R., Donahue, J., Darrell, T., Malik, J., 2013. “Rich feature hierarchies for accurate object detection and semantic segmentation”, arXiv:1311.2524. Girshick, 2015, Fast R-CNN Google Chrome Browser, [Online], Available at https://www.google.com/chrome/, 2020. He, K., Gkioxari, G., Dollar, P., Girshick, R., 2017. “Mask R-CNN”, arXiv:1703.06870. Imran, 2017, A comparison of feature extraction tecnique for malware analysis, Turkish Journal of Electrical Engineering & Computer Sciences, 25, 1173, 10.3906/elk-1601-189 Indola, F.N., Shen, A., Gao, P., Keutzer, K., 2015. “DeepLogo: hitting Logo Recognition with the Deep Neural Network Hammer”, arXiv:1510.02131. Jain, 2017, Phishing Detection: analysis of Visual Similarity Based Approaches, Security and Communication Networks, 10.1155/2017/5421046 Jain, 2018, “Detection of phishing attacks in financial and e-banking websites using link and visual similarity, International Journal of Information and Computer Security, 10, 398, 10.1504/IJICS.2018.095303 Kauser, 2014, Hybrid client side phishing website detection approach, International Journal of Advanced Computer Science andd Applications, 5, 132 King, 2009, Dlib-ml: a machine learning toolkit, International Journal of Machine Learning Research, 10, 1755 King, D.E., 2015. “Max-Margin Object Detection,” arXiv:1502.0046v1. LabelImg Tool, [Online], Available at https://github.com/tzutalin/labelImg, 2020. Lam, 2009, Counteracting Phishing Page Polymorphism: an Image Layout Analysis Approach Lazebnik, 2006, Beyond bags of features: spatial pyramid matching for recognizing natural scene categories, In Computer Vision and Pattern Recognition (CVPR) Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed,S., Fu, C-Y. Berg, A.C., 2015. “SSD: single Shot MultiBox Detector” arXiv:1512.02325. Liang, 2015, Moving object classification using local shape and HOG features in wavelet-transformed space with hierachical SVM classifers, Appl Soft Comput, 28, 10.1016/j.asoc.2014.09.051 Lin, T.Y., Goyal, P., Girschik, R., He, K., Dollar, P., 2017. “Focal loss for Dense Object Detection”, arXiv:1708.02002. Llorca, 2013, Vehicle logo recognition in traffic images using HOG Features and SVM Lowe, 2004, Distinctive Image Features from Scale-Invariant Keypoints, Int J Comput Vis, vol.50, 91, 10.1023/B:VISI.0000029664.99615.94 Mao, 2017, Phishing-Alarm: robust and efficient phishing detection via page component similarity, IEEE Access, 5, 17020, 10.1109/ACCESS.2017.2743528 Moghimi, 2016, New rule-based phishing detection method, Expert Systems with Applications, 53, 231, 10.1016/j.eswa.2016.01.028 Moore, 2007, Examining the Impact of Website Take-down on Phishing OpenCV, [Online], Available at http://opencv.org/, 2020. Oliveira, 2016, Automatic Graphic Logo Detection via Fast Region-based Convolutional Networks, In IJCNN 2016 Pascal VOC Dataset, [Online], Available at http://host.robots.ox.ac.uk/pascal/VOC/, 2019. Phishtank, [Online]. Available at https://www.phishtank.com/, 2020a. Phishbank, [Online]. Available at https://phishbank.org/, 2020b. Ramanathan, 2012, phishGILLNET – phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training, EURASIP Journal on Information Security, 10.1186/1687-417X-2012-1 Rao, 2015, PhishShield: a Desktop Application to Detect Phishing Webpages through Heuristic Approach, Procedia Comput Sci, 54, 147, 10.1016/j.procs.2015.06.017 Redmon, J., Divvala, S., Girshick, R., Farhadi, A., 2015. “You Only Look Once: unified, Real-Time Object Detection”, arXiv:1506.02640. Ren, S., He, K., Girshick, R., Sun, J., 2015. “Faster R-CNN: towards Real-Time Object Detection with Region Proposal Networks”, arXiv:1506.01497. Rosiello, 2007, A layout–similarity–based approach for detecting phishing pages Sathish, 2015, Phishing Webpage Detection for Secure Online Transactions, International Journal of Computer Science and Network Security, 15 Sheng, 2009, An emprical analysis of phishing black-lists Shirazi, H., Bezawada, B., Ray, I., Anderson C., “Adversarial Sampling Attacks Against Phishing Detection”, arXiv:1805.12177v2, 2019. Su, H., Gong, S., Zhu, X., 2018. “Scalable Deep Learning Logo Detection”, arXiv:1803.11417. The-Chung, 2014, An anti-phishing system employing diffused information, ACM Transaction on Information and System Security, 16, 1, 10.1145/2584680 Uijlings, 2013, Selective Search for Object Recognition, Int J Comput Vis, 104, 154, 10.1007/s11263-013-0620-5 Varshney, 2016, A survey and classification of web phishing detection schemes, Security and Communication Networks, 9, 6266, 10.1002/sec.1674 Wang, G., Liu, H., Becerra, S., Wang, K. “Verilogo: proactive Phishing Detection via Logo Recognition,” Technical Report CS2011-0669, UC San Diego, 2011. Xiang, 2011, CANTINA+: a feature-rich machine learning framework for detecting phishing web sites, ACM Transactions on Information and System Security, 14, 10.1145/2019599.2019606 Xiang, 2013