{"id":"https://openalex.org/W2040750298","doi":"https://doi.org/10.1109/tnsm.2014.2377295","title":"PhishStorm: Detecting Phishing With Streaming Analytics","display_name":"PhishStorm: Detecting Phishing With Streaming Analytics","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2040750298","doi":"https://doi.org/10.1109/tnsm.2014.2377295","mag":"2040750298"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2014.2377295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2014.2377295","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/hal-01092771","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040731348","display_name":"Samuel Marchal","orcid":"https://orcid.org/0000-0002-8522-2707"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Samuel Marchal","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035034365","display_name":"J\u00e9r\u00f4me Fran\u00e7ois","orcid":"https://orcid.org/0000-0002-7457-458X"},"institutions":[{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jerome Francois","raw_affiliation_strings":["INRIA Nancy Grand Est, Villers-l\u00e9s-Nancy, France","MADYNES - Management of dynamic networks and services (France)"],"affiliations":[{"raw_affiliation_string":"INRIA Nancy Grand Est, Villers-l\u00e9s-Nancy, France","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I1326498283"]},{"raw_affiliation_string":"MADYNES - Management of dynamic networks and services (France)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069228908","display_name":"Radu State","orcid":"https://orcid.org/0000-0002-4751-9577"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Radu State","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009071576","display_name":"Thomas Engel","orcid":"https://orcid.org/0000-0002-7374-3927"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thomas Engel","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"SnT - Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] (6, rue Richard Couhenhove-Kalergi L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Uni.lu - Universit\u00e9 du Luxembourg (6 rue Richard Coudenhove-Kalergi - L-1359 Luxembourg - Luxembourg)","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5040731348"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":22.087,"has_fulltext":false,"cited_by_count":230,"citation_normalized_percentile":{"value":0.99263268,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"11","issue":"4","first_page":"458","last_page":"471"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9518489241600037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8525635004043579},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.568055272102356},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.48830437660217285},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4420897960662842},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3306643068790436},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2775877118110657},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25459110736846924},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21960806846618652},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1995103359222412}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9518489241600037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8525635004043579},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.568055272102356},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.48830437660217285},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4420897960662842},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3306643068790436},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2775877118110657},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25459110736846924},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21960806846618652},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1995103359222412}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tnsm.2014.2377295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2014.2377295","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-01092771v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01092771","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Network and Service Management, 2014, pp.14. &#x27E8;10.1109/TNSM.2014.2377295&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:orbilu.uni.lu:10993/20053","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/20053","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Network and Service Management, 11(December), 458-471. New York, NY: IEEE Communications Society (2014).","raw_type":null}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01092771v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01092771","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Network and Service Management, 2014, pp.14. &#x27E8;10.1109/TNSM.2014.2377295&#x27E9;","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W50596167","https://openalex.org/W83428783","https://openalex.org/W155384935","https://openalex.org/W1537590135","https://openalex.org/W1542248099","https://openalex.org/W1546602224","https://openalex.org/W1553004598","https://openalex.org/W1567365482","https://openalex.org/W1593045043","https://openalex.org/W1780512231","https://openalex.org/W1954903228","https://openalex.org/W1981294881","https://openalex.org/W1981308378","https://openalex.org/W1983578042","https://openalex.org/W1985920648","https://openalex.org/W2020527679","https://openalex.org/W2023973750","https://openalex.org/W2025635041","https://openalex.org/W2033130105","https://openalex.org/W2050291832","https://openalex.org/W2053774863","https://openalex.org/W2054203538","https://openalex.org/W2081580037","https://openalex.org/W2082550445","https://openalex.org/W2092126505","https://openalex.org/W2100738695","https://openalex.org/W2104615308","https://openalex.org/W2111427271","https://openalex.org/W2117239687","https://openalex.org/W2121216923","https://openalex.org/W2121990650","https://openalex.org/W2122269925","https://openalex.org/W2123845384","https://openalex.org/W2133990480","https://openalex.org/W2134750673","https://openalex.org/W2136495567","https://openalex.org/W2139565456","https://openalex.org/W2146729596","https://openalex.org/W2148403395","https://openalex.org/W2154586245","https://openalex.org/W2159637323","https://openalex.org/W2161983758","https://openalex.org/W2165897980","https://openalex.org/W2166731089","https://openalex.org/W2245533262","https://openalex.org/W2327189300","https://openalex.org/W2540714166","https://openalex.org/W2886313391","https://openalex.org/W2911964244","https://openalex.org/W4205883304","https://openalex.org/W6606342502","https://openalex.org/W6632175784","https://openalex.org/W6632471062","https://openalex.org/W6632653372","https://openalex.org/W6634133269","https://openalex.org/W6635456232"],"related_works":["https://openalex.org/W4281884841","https://openalex.org/W2933056782","https://openalex.org/W2012481173","https://openalex.org/W2043034431","https://openalex.org/W1593211785","https://openalex.org/W2139572494","https://openalex.org/W3033830493","https://openalex.org/W2950465048","https://openalex.org/W4289429666","https://openalex.org/W2894592169"],"abstract_inverted_index":{"Despite":[0],"the":[1,12,30,97,100,109,113,143,254],"growth":[2],"of":[3,33,99,112,146,205],"prevention":[4],"techniques,":[5],"phishing":[6,34,45,59,75,90,136,181,194],"remains":[7],"an":[8,57],"important":[9],"threat":[10],"since":[11],"principal":[13],"countermeasures":[14],"in":[15,65,70,121,176,200,231],"use":[16],"are":[17,173],"still":[18],"based":[19,161,252],"on":[20,41,162,191,253],"reactive":[21],"URL":[22,46,69,101,114,160,216],"blacklisting.":[23],"This":[24],"technique":[25,188],"is":[26,189,227],"inefficient":[27],"due":[28],"to":[29,72,134,179],"short":[31],"lifetime":[32],"Web":[35],"sites,":[36],"making":[37],"recent":[38],"approaches":[39],"relying":[40],"real-time":[42,239],"or":[43,84],"proactive":[44],"detection":[47,60],"techniques":[48],"more":[49],"appropriate.":[50],"In":[51],"this":[52,122,128,139,232],"paper,":[53],"we":[54,141],"introduce":[55],"PhishStorm,":[56],"automated":[58],"system":[61,219],"that":[62,89,102,124,157,198,237],"can":[63,78,131],"analyze":[64],"real":[66,185],"time":[67],"any":[68,81],"order":[71],"identify":[73],"potential":[74],"sites.":[76,137],"PhishStorm":[77],"interface":[79],"with":[80,207],"email":[82],"server":[83],"HTTP":[85],"proxy.":[86],"We":[87,119,229],"argue":[88],"URLs":[91,182,197],"usually":[92],"have":[93],"few":[94],"relationships":[95],"between":[96],"part":[98,111],"must":[103],"be":[104,132],"registered":[105],"(low-level":[106],"domain)":[107],"and":[108,130,149,167,195,248],"remaining":[110],"(upper-level":[115],"domain,":[116],"path,":[117],"query).":[118],"show":[120],"paper":[123,233],"experimental":[125],"evidence":[126],"supports":[127],"observation":[129],"used":[133,175],"detect":[135,180],"For":[138],"purpose,":[140],"define":[142],"new":[144],"concept":[145],"intra-URL":[147],"relatedness":[148],"evaluate":[150],"it":[151],"using":[152,241],"features":[153,172],"extracted":[154],"from":[155,165,183],"words":[156],"compose":[158],"a":[159,184,201,215],"query":[163],"data":[164,250],"Google":[166],"Yahoo":[168],"search":[169],"engines.":[170],"These":[171],"then":[174],"machine-learning-based":[177],"classification":[178,203],"dataset.":[186],"Our":[187],"assessed":[190],"96":[192],"018":[193],"legitimate":[196],"result":[199],"correct":[202],"rate":[204,223],"94.91%":[206],"only":[208],"1.44%":[209],"false":[210],"positives.":[211],"An":[212],"extension":[213],"for":[214],"phishingness":[217],"rating":[218],"exhibiting":[220],"high":[221],"confidence":[222],"(":[224],"$>$":[225],"99%)":[226],"proposed.":[228],"discuss":[230],"efficient":[234],"implementation":[235],"patterns":[236],"allow":[238],"analytics":[240],"Big":[242],"Data":[243],"architectures":[244],"such":[245],"as":[246],"STORM":[247],"advanced":[249],"structures":[251],"Bloom":[255],"filter.":[256]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":37},{"year":2024,"cited_by_count":33},{"year":2023,"cited_by_count":23},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":26},{"year":2020,"cited_by_count":24},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":4}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
