{"title":"具有检测功能的反网络钓鱼工具的调查","authors":"Hiba Zuhair Zeydan, A. Selamat, M. Salleh","doi":"10.1109/ISBAST.2014.7013124","DOIUrl":null,"url":null,"abstract":"Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Survey of anti-phishing tools with detection capabilities\",\"authors\":\"Hiba Zuhair Zeydan, A. Selamat, M. Salleh\",\"doi\":\"10.1109/ISBAST.2014.7013124\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.\",\"PeriodicalId\":292333,\"journal\":{\"name\":\"2014 International Symposium on Biometrics and Security Technologies (ISBAST)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Symposium on Biometrics and Security Technologies (ISBAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISBAST.2014.7013124\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2014.7013124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey of anti-phishing tools with detection capabilities
Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.