{"title":"An Active Anti-phishing Solution Based on Semi-fragile Watermark","authors":"Huajun Huang, Yaojun Wang, Liqing Jiang, Lili Xie","doi":"10.3923/itj.2013.198.203","DOIUrl":null,"url":null,"abstract":"A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Netinfo Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3923/itj.2013.198.203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.