Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (7): 7-24.doi: 10.11959/j.issn.2096-109x.2017.00180

• Comprehensive Review • Previous Articles     Next Articles

Research of phishing detection technology

Xi ZHANG1,2,3,Zhi-wei YAN3,Hong-tao LI3,Guang-gang GENG3   

  1. 1 Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
    3 National Engineering Laboratory for Internet Domain Name Management,China Internet Network Information Center,Beijing 100190,China
  • Revised:2017-07-05 Online:2017-07-01 Published:2017-08-01
  • Supported by:
    The National Natural Science Foundation of China(61375039)


The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.

Key words: phishing fraud, phishing detection, machine learning, visual matching

CLC Number: