Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 7 SI
Page No. 8088 - 8094

PhishSys: A Honey Bee Inspired Intelligent System for Phishing Websites Detection

Authors : Abdulghani Ali Ahmed and Ali Safa Sadiq

References

Ahmed, A.A. and N.A. Abdullah, 2016. Real time detection of phishing websites. Proceedings of the IEEE 7th Annual Conference on Information Technology Electronics and Mobile Communication (IEMCON) 2016, October 13-15, 2016, IEEE, Pahang, Malaysia, ISBN:978-1-5090-0997-8, pp: 1-6.

Butler, C.G. and J.B. Free, 1951. The behaviour of worker honeybees at the hive entrance. Behav., 4: 262-291.
CrossRef  |  Direct Link  |  

Couvillon, M.J., E.J. Robinson, B. Atkinson, L. Child and K.R. Dent et al., 2008. En garde: Rapid shifts in honeybee, Apis mellifera, guarding behaviour are triggered by onslaught of conspecific intruders. Anim. Behav., 76: 1653-1658.
Direct Link  |  

Cranor, L.F., S. Egelman, J.I. Hong and Y. Zhang, 2007. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Carnegie Mellon University, Pittsburgh, Pennsylvania,.

Dunlop, M., S. Groat and D. Shelly, 2010. Goldphish: Using images for content-based phishing analysis. Proceedings of the IEEE 5th International Conference on Internet Monitoring and Protection, May 9-15, 2010, Barcelona, pp: 123-128.

Garera, S., N. Provos, M. Chew and A.D. Rubin, 2007. A framework for detection and measurement of phishing attacks. Proceedings of the 5th ACM Workshop on Recurring Malcode, October 29-November 2, 2007, Alexandria, VA., USA., pp: 1-8.

Intel Security, 2015. Millions of mobile app users are still exposed to SSL vulnerabilities. Intel Security, Santa Clara, California, USA. https://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf

Jagatic, T.N., N.A. Johnson, M. Jakobsson and F. Menczer, 2007. Social phishing. Commun. ACM, 50: 94-100.
CrossRef  |  Direct Link  |  

Jantan, A. and A.A. Ahmed, 2014. Honey bee intelligent model for network zero day attack detection. Intl. J. Digital Content Technol. Appl., 8: 45-45.

Jantan, A. and A.A. Ahmed, 2014. Honeybee protection system for detecting and preventing network attacks. J. Theor. Appl. Inf. Technol., 64: 38-47.
Direct Link  |  

Ludl, C., S. McAllister, E. Kirda and C. Kruegel, 2007. On the effectiveness of techniques to detect phishing sites. Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, July 12-13, 2007, Lucerne, Switzerland, pp: 20-39.

Osareh, A. and B. Shadgar, 2008. Intrusion detection in computer networks based on machine learning algorithms. Intl. J. Comput. Sci. Netw. Secur., 8: 15-23.
Direct Link  |  

PhishTank, 2015. Join the fight against phishing. PhishTank, San Francisco, California, USA. https://www.phishtank.com/

Rains, G.C., J.K. Tomberlin and D. Kulasiri, 2008. Using insect sniffing devices for detection. Trends Biotechnol., 26: 288-294.
PubMed  |  Direct Link  |  

Sheng, S., B. Wardman, G. Warner, L.F. Cranor and J. Hong et al., 2009. An empirical analysis of phishing blacklists. Proceedings of 6th Conference on Email and Anti-Spam (CEAS) 2009, July 16-17, 2009,: Carnegie Mellon University, Mountain View, California,-pp: 1.
Direct Link  |  

Srinoy, S., 2007. Intrusion detection model based on particle swarm optimization and support vector machine. Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, April 1-5, 2007, Honolulu, HI., pp: 186-192.

Stabentheiner, A., H. Kovac and S. Schmaranzer, 2002. Honeybee nestmate recognition: The thermal behaviour of guards and their examinees. J. Exp. Biol., 205: 2637-2642.
PubMed  |  Direct Link  |  

Zhang, Y., J. Hong and L. Cranor, 2007. CANTINA: A content-based approach to detecting phishing web sites. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, Banff, Alberta, Canada, pp: 639-648.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved