{"id":"https://openalex.org/W2027063184","doi":"https://doi.org/10.1080/15567280600995808","title":"PhishScope: Tracking Phish Server Clusters","display_name":"PhishScope: Tracking Phish Server Clusters","publication_year":2006,"publication_date":"2006-07-01","ids":{"openalex":"https://openalex.org/W2027063184","doi":"https://doi.org/10.1080/15567280600995808","mag":"2027063184"},"language":"en","primary_location":{"id":"doi:10.1080/15567280600995808","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280600995808","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004440524","display_name":"J. Quarterman","orcid":null},"institutions":[{"id":"https://openalex.org/I193374721","display_name":"Internet Society","ror":"https://ror.org/04dzfqx38","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I193374721"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"John S. Quarterman","raw_affiliation_strings":["InternetPerils, Inc. Mailstop 319 12407 N. Mopac Expwy. Suite 100 , Austin, Texas, 78758-2429, USA"],"affiliations":[{"raw_affiliation_string":"InternetPerils, Inc. Mailstop 319 12407 N. Mopac Expwy. Suite 100 , Austin, Texas, 78758-2429, USA","institution_ids":["https://openalex.org/I193374721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004440524"],"corresponding_institution_ids":["https://openalex.org/I193374721"],"apc_list":null,"apc_paid":null,"fwci":1.6417,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88225958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":"2","first_page":"103","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9334999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.657014012336731},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3681938350200653}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.657014012336731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3681938350200653}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/15567280600995808","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280600995808","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"ABSTRACT":[0],"Phishing":[1],"often":[2],"seems":[3],"an":[4,130],"intractable":[5],"problem,":[6],"because":[7],"phishers":[8],"go":[9],"to":[10,13,36,61,91,94,128,132,142,214,247,267,288,301,339,370,388,392],"such":[11,44,98,121,174],"lengths":[12],"hide":[14],"their":[15,322],"tracks":[16],"by":[17,107,183,187,190,194,285],"staging":[18],"attacks":[19],"through":[20],"multiple":[21,161,216],"countries":[22],"and":[23,29,72,193,273,299,319,357],"legal":[24,79],"regimes.":[25],"Targets":[26,81],"of":[27,53,65,82,114,120,154,163,170,185,199,206,232,237,245,278,306,313,321,335,343,354,365,378,385],"phishing":[28,55,83,88,109,149,155,175,191,200,246,317,324,398],"law":[30],"enforcement":[31,136],"thus":[32,74,178],"have":[33],"few":[34],"levers":[35],"use":[37,85],"against":[38],"phishing.":[39],"This":[40,308],"article":[41],"demonstrates":[42,351],"one":[43,158],"lever:":[45],"a":[46,51,108,147,152,204,220,253,260,282],"method":[47],"(PhishScope)":[48],"for":[49,180],"pinpointing":[50],"cluster":[52,110,153,205],"active":[54],"servers":[56,325],"that":[57,159],"are":[58,73,211,326,400],"all":[59,125],"connected":[60],"the":[62,66,77,118,168,230,238,264,279,295,310,316,333,336,340,344,352,355,359,363,366,371,376,379,382,386,393,397],"same":[63,67,78],"part":[64],"Internet":[68,271],"service":[69,283],"provider":[70],"(ISP)":[71],"located":[75],"in":[76,252,328],"regime.":[80],"can":[84,228],"information":[86,122,314,391],"about":[87,173],"server":[89],"clusters":[90,176,210,318,380,399],"encourage":[92],"ISPs":[93,188],"take":[95,133],"appropriate":[96],"action":[97,227],"as":[99],"taking":[100],"down":[101],"rogue":[102],"servers.":[103],"An":[104,196],"ISP":[105,131],"infested":[106,189],"may":[111,123,139,165],"be":[112,124,166],"unaware":[113],"its":[115],"presence,":[116],"so":[117],"receipt":[119],"it":[126,269,293],"takes":[127],"persuade":[129],"action.":[134],"Law":[135],"agencies":[137],"(LEAs)":[138],"not":[140],"want":[141],"expend":[143],"any":[144],"effort":[145],"on":[146],"single":[148,221],"report,":[150],"but":[151],"servers,":[156,192,208],"especially":[157],"involves":[160],"targets":[162,184],"phishing,":[164,186],"worth":[167],"expenditure":[169],"resources.":[171],"Information":[172],"is":[177,287],"leverageable":[179,390],"proactive":[181],"intervention":[182],"LEAs.":[195],"individual":[197],"target":[198],"usually":[201],"cannot":[202],"detect":[203],"compromised":[207],"since":[209],"set":[212],"up":[213],"attack":[215],"targets,":[217],"rather":[218],"than":[219],"target.":[222],"By":[223],"combining":[224],"forces,":[225],"collective":[226],"reveal":[229],"existence":[231],"hostile":[233],"clusters.":[234],"Specifically,":[235],"members":[236],"Anti-Phishing":[239],"Working":[240],"Group":[241],"(APWG)":[242],"send":[243],"reports":[244],"APWG,":[248],"which":[249,268],"collects":[250],"them":[251],"repository.":[254],"InternetPerils":[255],"receives":[256],"frequent":[257],"(three":[258],"times":[259],"week)":[261],"dumps":[262],"from":[263],"APWG":[265,297],"repository":[266],"adds":[270],"topological":[272],"performance":[274],"information.":[275],"The":[276],"objective":[277],"PhishScope":[280],"technology,":[281],"developed":[284],"InternetPerils,":[286],"collect":[289],"supplementary":[290],"data,":[291,298],"combine":[292],"with":[294],"incoming":[296],"then":[300],"simultaneously":[302],"analyze":[303],"both":[304],"sources":[305],"data.":[307,345],"ensures":[309],"timely":[311],"availability":[312],"while":[315,396],"many":[320],"constituent":[323],"still":[327,401],"use.":[329],"Graphical":[330],"presentation":[331],"makes":[332,362],"nature":[334],"problem":[337],"visible":[338],"intended":[341,372],"users":[342],"Comparing":[346],"data":[347],"sets":[348],"over":[349],"time":[350],"persistence":[353,377],"phenomenon,":[356],"animating":[358],"graphical":[360],"contours":[361],"extent":[364],"infection":[367],"readily":[368],"comprehensible":[369],"users.":[373],"Finally,":[374],"demonstrating":[375],"supports":[381],"main":[383],"purpose":[384],"PhishScope:":[387],"provide":[389],"affected":[394],"parties":[395],"attacking.":[402]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
