PhishLive: A View of Phishing and Malware Attacks from an Edge Router.
Lianjie CaoThibaut ProbstRamana Rao KompellaPublished in: PAM (2013)
Keyphrases
- countermeasures
- phishing attacks
- detect malicious
- identity theft
- malicious code
- security risks
- reverse engineering
- edge detector
- phishing emails
- multiple views
- malicious activities
- spam filtering
- static analysis
- detecting malicious
- weighted graph
- attack scenarios
- traffic analysis
- ip networks
- network layer
- security threats
- dos attacks
- web pages
- fraud detection
- end to end
- edge detection
- multiscale
- website