Yue Zhang’s research while affiliated with Carnegie Mellon University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


CANTINA: A content-based approach to detecting phishing web sites
  • Conference Paper

May 2007

·

2,001 Reads

·

804 Citations

Yue Zhang

·

·

Phishing is a significant problem involving fraudul ent email and web sites that trick unsuspecting users into reveal ing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF i nformation retrieval algorithm. We also discuss the design and evaluation of several heuristics we developed to reduce false pos itives. Our experiments show that CANTINA is good at detecting phishing sites, correctly labeling approximately 95% of phis hing sites.


Figure 1: The Cloudmark Anti-Fraud Toolbar indicating a legitimate site. 
Figure 2: The EarthLink Toolbar indicating a legitimate site. 
Figure 3: The eBay Toolbar at a site not owned by eBay that is not known to be a phishing site. 
Table 3 : Number of phishing sites initially identified incorrectly that were later identified correctly by anti-phishing toolbars.
Figure 4: The GeoTrust TrustWatch Toolbar at a verified site. 

+10

Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
  • Conference Paper
  • Full-text available

January 2007

·

2,528 Reads

·

210 Citations

Download

Phinding phish: Evaluating anti-phishing tools

January 2007

·

4,090 Reads

·

246 Citations

There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. We developed an automated test bed for testing anti-phishing tools. We used 200 verified phishing URLs from two sources and 516 legitimate URLs to test the effectiveness of 10 popular anti-phishing tools. Only one tool was able to consistently identify more than 90% of phishing URLs correctly; however, it also incorrectly identified 42% of legitimate URLs as phish. The performance of the other tools varied considerably depending on the source of the phishing URLs. Of these remaining tools, only one correctly identified over 60% of phishing URLs from both sources. Performance also changed significantly depending on the freshness of the phishing URLs tested. Thus we demonstrate that the source of phishing URLs and the freshness of the URLs tested can significantly impact the results of anti-phishing tool testing. We also demonstrate that many of the tools we tested were vulnerable to simple exploits. In this paper we describe our anti-phishing tool test bed, summarize our findings, and offer observations about the effectiveness of these tools as well as ways they might be improved.

Citations (3)


... These blacklists are among the most important mechanisms for protecting Internet users from phishing attacks [16,19]. However, research has shown that anti-phishing blacklists suffer from limitations in coverage, update speed, and accuracy, resulting in poor performance in protecting users from zero-day phishing attacks [53,54]. Additionally, recent studies identified that these blacklists are vulnerable to evasion techniques, as they rely on content verification to identify phishing webpages. ...

Reference:

Exploration and Evaluation of Human-centric Cloaking Techniques in Phishing Websites
Phinding phish: Evaluating anti-phishing tools

... CallingID toolbar runs in 98/NT/2000/XP Windows and Internet Explorer. [20]: when users visit the site, Cloud mark tools adapt it site with exist sites in blacklist, if availability it in blacklisted are displayed a warning to site as other methods. If it is not found in the black list, the site is assessed based on the feature popularity of the site. ...

Phinding Phish: An Evaluation of Anti-Phishing Toolbars.

... This section reviews existing methods, their limitations, and how our approach effectively addresses these challenges. Y. Zhang et al. [15] introduced a content-based method for phishing detection by analyzing web page textual content, generating TF-IDF-based lexical signatures, and leveraging Google search for domain name comparisons. S. Sheng et al. [16] evaluated phishing blacklists and highlighted their limited initial detection accuracy (<20% within the first hour). ...

CANTINA: A content-based approach to detecting phishing web sites
  • Citing Conference Paper
  • May 2007