Team for Research in
Ubiquitous Secure Technology

PhishCatch - A Phishing Detection Tool
Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani

Citation
Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani. "PhishCatch - A Phishing Detection Tool". The 33rd 2009 IEEE International Computer Software and Applications Conference, IEEE Computer Society, 491-496, 22, September, 2009.

Abstract
Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact of phishing is drastic and significant since it can involve the risk of identity theft and financial losses. This paper explains the most popular methods used for phishing and the PhishCatch algorithm developed to detect phishing. The PhishCatch algorithm is a heuristic based algorithm which will detect phishing emails and alert the users about the phishing emails. The phishing filters and rules in the algorithm are formulated after extensive research of phishing methodologies and tactics. After testing, we determined that PhishCatch algorithm has a catch rate of 80% and an accuracy of 99%. The approach used in developing this algorithm, the implementation details and testing results are discussed in this paper.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Weider D. Yu, Shruti Nargundkar, Nagapriya  Tiruthani. <a
    href="http://www.truststc.org/pubs/696.html"
    >PhishCatch - A Phishing Detection Tool</a>, The
    33rd 2009 IEEE International Computer Software and
    Applications Conference, IEEE Computer Society, 491-496, 22,
    September, 2009.
  • Plain text
    Weider D. Yu, Shruti Nargundkar, Nagapriya  Tiruthani.
    "PhishCatch - A Phishing Detection Tool". The 33rd
    2009 IEEE International Computer Software and Applications
    Conference, IEEE Computer Society, 491-496, 22, September,
    2009.
  • BibTeX
    @inproceedings{YuNargundkarTiruthani09_PhishCatchPhishingDetectionTool,
        author = {Weider D. Yu and Shruti Nargundkar and Nagapriya 
                  Tiruthani},
        title = {PhishCatch - A Phishing Detection Tool},
        booktitle = {The 33rd 2009 IEEE International Computer Software
                  and Applications Conference},
        organization = {IEEE Computer Society},
        pages = {491-496},
        day = {22},
        month = {September},
        year = {2009},
        abstract = {Phishing has become the most popular practice
                  among the criminals of the Web. Phishing attacks
                  are becoming more frequent and sophisticated. The
                  impact of phishing is drastic and significant
                  since it can involve the risk of identity theft
                  and financial losses. This paper explains the most
                  popular methods used for phishing and the
                  PhishCatch algorithm developed to detect phishing.
                  The PhishCatch algorithm is a heuristic based
                  algorithm which will detect phishing emails and
                  alert the users about the phishing emails. The
                  phishing filters and rules in the algorithm are
                  formulated after extensive research of phishing
                  methodologies and tactics. After testing, we
                  determined that PhishCatch algorithm has a catch
                  rate of 80% and an accuracy of 99%. The approach
                  used in developing this algorithm, the
                  implementation details and testing results are
                  discussed in this paper. },
        URL = {http://www.truststc.org/pubs/696.html}
    }
    

Posted by Weider D. Yu on 2 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.