Now 419 visitors
Today:175 Yesterday:1517
Total: 1954 395S 104P 50R
2025-12-16, Week 51
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20230129 Question.1
Questioner: 7022211005@mhs.its.ac.id    2023-02-20 ¿ÀÈÄ 5:40:01
IEEE/ICACT20230129 Answer.1
Answer by Auhor h22001iy@edu.tuis.ac.jp   2023-02-20 ¿ÀÈÄ 5:40:01
Dear authors, Based on slide 5 states that phishers frequently change domain names and IP addresses of website to avoid detection. Do this research observes this event by DNS graph as long as observed days? Thank you Thank you for your question. Yes, we are currently monitoring the lifecycle of phishing sites, including changes to phishing domains and IPs. We do this by monitoring the HTTP and HTTPS responses of phishing sites that have already been reported. However, identifying the next active domain after a phishing site has been shut down is still an area for future work. (See slide 17) Currently, we rely on reports from the community such as PhishTank, PhishStats, OpenPhish, and the Council of Anti-Phishing Japan.

Select Voice