04.01.2015 Views

Keypoint Matching Technique and Its Applications

Keypoint Matching Technique and Its Applications

Keypoint Matching Technique and Its Applications

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Experiments: data description<br />

• Phishing pages: 2,058 pages on 74 sites<br />

– source: http://www.phishtank.com, http://www.antiphishing.org<br />

– records of top 5 phishing target sites are more than half of our records<br />

Domain<br />

Number of Records<br />

eBay 701<br />

PayPal 632<br />

Marshall & Ilsley 138<br />

Charter One 116<br />

Bank of America 51<br />

• Potential target pages: 300 vulnerable pages<br />

– source: http://www.ciphertrust.com/resources/statistics/<br />

• Pre-stored data set<br />

– positive: 2,058 comparisons<br />

– negative: 44,000 comparisons<br />

60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!