Review Article
Phishing Detection: Analysis of Visual Similarity Based Approaches
Table 4
Analysis of hybrid approaches on various attacks.
| Approach | Zero-hour protection | Embedded object | Language independence | Partially copied webpage | DNS attack |
| Bayesian model [79] | × | √ | × | × | × | Hybrid features [81] | × | √ | × | × | × | Using phishing target [82] | √ | √ | × | √ | × | Website logo for phishing detection [83] | √ | √ | √ | √ | × |
|
|