浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 国家计算机网络应急技术处理协调中心,北京 100029
[ "邹学强(1978-),男,福建莆田人,国家计算机网络应急技术处理协调中心博士生,主要研究方向为信息安全、网络空间测绘、网络流量分析等。" ]
[ "张鹏(1984-),男,安徽淮南人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为服务计算和大数据处理和挖掘。" ]
[ "黄彩云(1994-),女,四川达州人,中国科学院信息工程研究所硕士生,主要研究方向为网络安全、大数据处理和挖掘。" ]
[ "陈志鹏(1989-),男,山东威海人,中国科学院信息工程研究所博士生,主要研究方向为网络安全、大数据处理和挖掘。" ]
[ "孙永(1976-),男,辽宁阜新人,博士,中国科学院信息工程研究所高级工程师,主要研究方向为信息安全、大数据处理和挖掘。" ]
[ "刘庆云(1980-),男,河北衡水人,博士,中国科学院信息工程研究所高级工程师,主要研究方向为网络安全和数据挖掘。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
邹学强, 张鹏, 黄彩云, 等. 基于页面布局相似性的钓鱼网页发现方法[J]. 通信学报, 2016,37(Z1):116-124.
Xue-qiang ZOU, Peng ZHANG, Cai-yun HUANG, et al. Phishing attacks discovery based on HTML layout similarity[J]. Journal on communications, 2016, 37(Z1): 116-124.
邹学强, 张鹏, 黄彩云, 等. 基于页面布局相似性的钓鱼网页发现方法[J]. 通信学报, 2016,37(Z1):116-124. DOI: 10.11959/j.issn.1000-436x.2016257.
Xue-qiang ZOU, Peng ZHANG, Cai-yun HUANG, et al. Phishing attacks discovery based on HTML layout similarity[J]. Journal on communications, 2016, 37(Z1): 116-124. DOI: 10.11959/j.issn.1000-436x.2016257.
针对钓鱼网页与真实网页布局结构相似的特点,提出了基于页面布局相似性的钓鱼网页发现方法,该方法首先抽取出网页中带链接属性的标签作为特征,然后基于该特征提取网页标签序列分支来标识网页;接着通过网页标签序列树对齐算法将网页标签序列树的对齐转换成网页标签序列分支的对齐,使二维的树结构转换成一维的字符串结构,最后通过生物信息学 BLOSUM62编码的替换矩阵快速计算对齐分值,从而提高钓鱼网页的检测效果,仿真实验表明该方法可行,并具有较高的准确率和召回率。
Based on the similarity of the layout structure between the phishing sites and real sites
an approach to discover phishing sites was presented.First
the tag with link attribute as a feature was extracted
and then based on the feature
the page tag sequence branch to identify website was extracted
followed by the page layout similarity-HTMLTagAntiPhish
the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted
this converted two-dimention tree structure into one-dimention string structure
and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding
alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.
LI Z , ALRWAIS S , XIE Y , et al . Finding the linchpins of the dark Web:a study on topologically dedicated hosts on malicious web infrastruc-tures[C]//IEEE Symposium on Security and Privacy (SP) . 2013 : 112 - 126 .
CANALI D , COVA M , VIGNA G , et al . Prophiler:a fast filter for the large-scale detection of malicious web pages[C]//The 20th Interna-tional Conference on World Wide Web . 2011 : 197 - 206 .
ESHETE B , VILLAFIORITA A , WELDEMARIAM K . Binspect:holis-tic analysis and detection of malicious web pages [J ] . Security and Pri-vacy in Communication Networks , 2013 , 106 : 149 - 166 .
PRAKASH P , KUMAR M , KOMPELLA R R , et al . Phishnet:predictive blacklisting to detect phishing attacks[C]//The 29th IEEE International Conference on Computer Communications (INFOCOM) . 2010 : 1 - 5 .
SHENG S , WARDMAN B , WARNER G , et al . An empirical analysis of phishing blacklists[C]//The 6th Conference in Email and Anti-Spam (CEAS) . 2009 .
LIU G , QIU B , LIU Y . Automatic detection of phishing target from phishing webpage[C]//The 20th International Conference on Pattern Recognition (ICPR) . 2010 : 4153 - 4156 .
BLOSUM62 substitution matrix [EB/OL ] . http://www.uky.edu/Classes/BIO/520/BIO520WWW/blosum62.htm http://www.uky.edu/Classes/BIO/520/BIO520WWW/blosum62.htm .
OpenDNS PhishTank [EB/OL ] . http://www.phishtank.com http://www.phishtank.com . 2014 .
URoulette.Home Page [EB/OL ] . http://www.uroulette.com http://www.uroulette.com , 2007 .
0
浏览量
913
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构