Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

First, let’s quickly review the clusters we built to understand phishing attacks. Using data we collected over the course of a year spent tracking and taking down phishing cases for a major U.S. financial institution, we extracted features from four categories: similarity analysis, structure analysis, phishing visitors tracking and domain registration. Then, using the expectation-maximization... Continue Reading →

Clustering of Phishing Attacks

In a recent report we showed how we are able to gain better understanding of phishing attacks and attackers by using cluster analysis. This post lays out in greater detail how to create those clusters by examining the features and methods used.For the study, we used the data collected over the course of more than a year... Continue Reading →

Fraud Detection with Advanced Outlier Detection Algorithms

Fraud Detection with Advanced Outlier Detection Algorithms Online fraud costs the global economy more than $400 billion, with more than 800 million personal records stolen in 2013 alone. Increasingly, fraud has diversified to different digital channels, including mobile and online payments, creating new challenges as innovative fraud patterns emerge. One technique organizations use to detect and prevent... Continue Reading →

Up ↑