Exploit URL patterns based on the proposed N-gram model to extract identity keywords
Attain robustness in detecting phishing webpages hosted in any language
Offers long-term effectiveness by leveraging on permanent phishing characteristic
Achieve higher accuracy in finding target identity by using compromise programming
Suppress false positives by exploiting indirect identity relationships