Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Table 4

Analysis of hybrid approaches on various attacks.

ApproachZero-hour protectionEmbedded objectLanguage independencePartially copied webpageDNS attack

Bayesian model [79]××××
Hybrid features [81]××××
Using phishing target [82]××
Website logo for phishing detection [83]×