Your browser doesn't support javascript.
loading
Behind the Bait: Delving into PhishTank's hidden data.
Yasin, Affan; Fatima, Rubia; Khan, Javed Ali; Afzal, Wasif.
Afiliação
  • Yasin A; School of Software, Northwestern Polytechnical University, Xian 710072, Shaanxi, China.
  • Fatima R; School of Software, Tsinghua University, Beijing, China.
  • Khan JA; Department of Computer Science, School of Physics, Engineering & Computer Science, University of Hertfordshire, Hatfield, UK.
  • Afzal W; School of Innovation, Design and Engineering, Mälardalen University, Västerås, Sweden.
Data Brief ; 52: 109959, 2024 Feb.
Article em En | MEDLINE | ID: mdl-38152492
ABSTRACT
Phishing constitutes a form of social engineering that aims to deceive individuals through email communication. Extensive prior research has underscored phishing as one of the most commonly employed attack vectors for infiltrating organizational networks. A prevalent method involves misleading the target by employing phishing URLs concealed through hyperlink strategies. PhishTank, a website employing the concept of crowd-sourcing, aggregates phishing URLs and subsequently verifies their authenticity. In the course of this study, we leveraged a Python script to extract data from the PhishTank website, amassing a comprehensive dataset comprising over 190,0000 phishing URLs. This dataset is a valuable resource that can be harnessed by both researchers and practitioners for enhancing phish- ing filters, fortifying firewalls, security education, and refining training and testing models, among other applications.
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article