{"title":"Phisherman:一个网络钓鱼数据库","authors":"G. Tally","doi":"10.1109/CATCH.2009.24","DOIUrl":null,"url":null,"abstract":"Phishing is a wide spread and rapidly evolving form of electronic identity theft that attempts to gather personally identifying information from unwitting victims, often through social engineering. The “classic” phishing attack starts with a “lure” (unsolicited e-mail) that directs recipients to a fraudulent Web site that appears to be that of a well-known company, government agency, or other organization. Phishing data is collected by numerous organizations, resulting in many disjoint collections of varying quality and content. The goal of the Phisherman project is to create a single information resource available that provides ready access to on-going and historical phishing attacks for first-responders, brand owners, researchers, and law enforcement. The challenges include rapid automated validation to cope with the increasing scale of the attacks, and privacy protection, particularly when attacks are targeted at specific individuals.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Phisherman: A Phishing Data Repository\",\"authors\":\"G. Tally\",\"doi\":\"10.1109/CATCH.2009.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing is a wide spread and rapidly evolving form of electronic identity theft that attempts to gather personally identifying information from unwitting victims, often through social engineering. The “classic” phishing attack starts with a “lure” (unsolicited e-mail) that directs recipients to a fraudulent Web site that appears to be that of a well-known company, government agency, or other organization. Phishing data is collected by numerous organizations, resulting in many disjoint collections of varying quality and content. The goal of the Phisherman project is to create a single information resource available that provides ready access to on-going and historical phishing attacks for first-responders, brand owners, researchers, and law enforcement. The challenges include rapid automated validation to cope with the increasing scale of the attacks, and privacy protection, particularly when attacks are targeted at specific individuals.\",\"PeriodicalId\":130933,\"journal\":{\"name\":\"2009 Cybersecurity Applications & Technology Conference for Homeland Security\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Cybersecurity Applications & Technology Conference for Homeland Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CATCH.2009.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CATCH.2009.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Phishing is a wide spread and rapidly evolving form of electronic identity theft that attempts to gather personally identifying information from unwitting victims, often through social engineering. The “classic” phishing attack starts with a “lure” (unsolicited e-mail) that directs recipients to a fraudulent Web site that appears to be that of a well-known company, government agency, or other organization. Phishing data is collected by numerous organizations, resulting in many disjoint collections of varying quality and content. The goal of the Phisherman project is to create a single information resource available that provides ready access to on-going and historical phishing attacks for first-responders, brand owners, researchers, and law enforcement. The challenges include rapid automated validation to cope with the increasing scale of the attacks, and privacy protection, particularly when attacks are targeted at specific individuals.