Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Table 2

Comparison of visual features based approaches.

ApproachZero-hour protectionEmbedded objectLanguage independencePartially copied webpageDNS attack

Visual signature [66]NoNoNoNoNo
Site signature [67]NoYesNoYesNo
PhishZoo [68]NoYesYesYesNo