Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 3
Page No. 553 - 560

QRphish: An Automated QR Code Phishing Detection Approach

Authors : Ahmad Y. Alnajjar, Mohammed Anbar, Selvakumar Manickam, Omar Elejla and Homam El-Taj

References

ALmomani, A., B. Gupta, T.C. Wan, A. Altaher, and S. Manickam, 2013. Phishing dynamic evolving neural fuzzy framework for online detection zeroday phishing email phishing email. Ind. J. Sci. Technol., 6: 3960-3964.

Basnet, R.B., S. Mukkamala and A.H. Sung, 2008. Detection of phishing attacks: A machine learning approach. In: Studies in Fuzziness and Soft Computing, Prasad, B. (Ed.), Springer Berlin Heidelberg, New York, Pp: 373-383.

Chandrasekaran, M., K. Narayanan and S. Upadhyaya, 2006. Phishing email detection based on structural properties. Proceedings of the 9th Annual NYS Cyber Security Conference: Symposium on Information Assurance, June 14-15, 2006, Albany, New York, Pp: 1-7.

Chou, N., R. Ledesma, Y. Teraguchi, D. Boneh and J. Mitchell, 2004. Client-side defense against web-based identify theft. Proceedings of the 11th Annual Network and Distributed System Security Symposium, February 5-6, 2004, San Diego, CA., USA., pp: 1-16.

DENSO ADC., 2012. QR code essentials. https://www.nacs.org/LinkClick.aspx?fileticket=D1FpVAvvJuo%3D&tabid=1426&mid=4802.

Dhanalakshmi, R., 2012. Studying and improving techniques to mitigate E-mail threats. Ph.D. Thesis, Faculty Of Information And Communication Engineering Anna University, Chennai.

Fette, I., N. Sadeh and A. Tomasic, 2007. Learning to detect phishing emails. Proceedings of the 16th International World Wide Web Conference, May 8-12, ACM Press, Banff, Alberta, Canada, pp: 649-656.

Friedman, N., D. Geiger and M. Goldszmidt, 1997. Bayesian network classifiers. Mach. Learn., 29: 131-163.
CrossRef  |  Direct Link  |  

Garera, S., N. Provos, M. Chew and A.D. Rubin, 2007. A framework for detection and measurement of phishing attacks. Proceedings of the 5th ACM Workshop on Recurring Malcode, October 29-November 2, 2007, Alexandria, VA., USA., pp: 1-8.

ISO/IEC18004, 2006. Information technology-automatic identification and data capture techniques-QR code 2005 bar code symbology specification. International Organization for Standardization, Switzerland.

Kharraz, A., E. Kirda, W. Robertson, D. Balzarotti and A. Francillon, 2014. Optical delusions: A study of malicious QR codes in the wild. Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 23-26, 2014, Atlanta, GA., USA., pp: 192-203.

Kumaraguru, P., Y. Rhee, A. Acquisti, L.F. Cranor, J. Hong and E. Nunge, 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, USA., April 30-May 03, 2007, ACM, Press, New York, pp: 905-914.

Ma, J., L. Saul, S. Savage and G. Voelker, 2009. Identifying suspicious URLs: An application of large-scale online learning. Proceedings of the 26th Annual International Conference on Machine Learning, June 14-18, 2009, Montreal, Quebec, Canada, Pp: 681-688.

Mc Cann, S., 2005. Assessment of the EDQ-Rank Link Analysis Algorithm. Master Thesis, National University of Ireland.

Miyamoto, D., H. Hazeyama and Y. Kadobayashi, 2009. An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites. In: Advances in Neuro-Information Processing, Koppen, M., N. Kasabov and G. Coghill (Eds.). Springer, Berlin, Germany, ISBN: 978-3-642-02489-4, pp: 539-546.

Moore, T. and R. Clayton, 2007. An empirical analysis of the current state of phishing attack and defence. Proceedings of the 6th Annual Workshop on the Economics of Information Security, June 7-8, 2007, Pittsburgh, PA, USA -.

Moore, T. and R. Clayton, 2007. Examining the impact of website takedown on phishing. Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit, October 04-05, 2007, Pittsburgh, PA, USA., Pp: 1-13.

Sheng, S., B. Magnien, P. Kumaraguru, A. Acquisti, L.F. Cranor, J. Hong and E. Nunge, 2007. Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. Proceedings of the 3rd Symposium on Usable Privacy and Security, July 18-20, 2007, Pittsburgh, PA., USA., pp: 88-99.

Sheng, S., B. Wardman, G. Warner, L. Cranor, J. Hong and C. Zhang, 2009. An empirical analysis of phishing blacklists. Proceedings of the 6th Conference on Email and Anti-Spam, July 16-17, 2009, Mountain View, California, USA -.

Thomas, K., C. Grier, J. Ma, V. Paxson and D. Song, 2011. Design and evaluation of a real-time URL spam filtering service. Proceedings of the IEEE Symposium on Security and Privacy, May 22-25, 2011, Berleley, California, USA., pp: 447-462.

Vidas, T., E. Owusu, S. Wang, C. Zeng and L. Cranor, 2012. QRishing: The susceptibility of smartphone users to QR code phishing attacks. Proceedings of the 19th ACM Conference on Computer and Communications Security, October 16-18, 2012, Raleigh, NC, USA., Pp: 1-12.

Whittaker, C., B. Ryner and M. Nazif, 2010. Large-scale automatic classification of phishing. Proceedings of the Network and Distributed System Security Symposium, February 28-March 3, 2010, San Diego, California, USA -.

Xiang, G., J.I. Hong, C.P. Rose and L.F. Cranor, 2011. CANTINA+: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inform. Syst. Secur., 14: 21-48.
Direct Link  |  

Zhang, Y., J. Hong and L. Cranor, 2007. CANTINA: A content-based approach to detecting phishing web sites. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, Banff, Alberta, Canada, pp: 639-648.

Zhang, Y., S. Egelman, L. Cranor and J. Hong, 2007. Phinding Phish: Evaluating anti-phishing tools. Proceedings of the 14th Annual Network and Distributed System Security Symposium, February 28-March 2, 2007, Catamaran Resort Hotel, San Diego, CA., USA., pp: 1-16.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved