Analysis of Efficient Classification Algorithm for Detection of Phishing Site

Authors

  • Meenu Shukla Department of CSE/IT, Madhav Institute of Technology and Science, RGPV, Gwalior, India
  • Sanjiv Sharma Department of CSE/IT, Madhav Institute of Technology and Science, RGPV, Gwalior, India

Keywords:

Phishing sites, URL based features, Web Source Based Features, Machine learning, Random Forest

Abstract

Phishing is mainly related to steal the confidential information and personal data of web users by making duplicate of the original one in which the content and images are almost similar to the legitimate website with small changes. Other method of phishing is to make changes in the URL that is approximately similar to legitimate website. Here we have discussed the different methods for phishing detection and some of the disadvantages of them. In this paper, we proposed phishing detection on the basis of web source and uses uniform resource locator (URL) features. We identified the features that contained in the phishing URLs. The technique is evaluated with a dataset of phishing URLs and White List URLs. The results evaluated shows that with this technique we are able to detect more phishing sites.

 

References

J. Hong, “The state of phishing attacks”, Communications of the ACM, vol. 55, Issue 1, pp. 74-81, 2012.

A. Sardana, A Naga Venkata Sunil, “A PageRank Based Detection Technique for Phishing Web Sites”, IEEE Symposium on Computer and Informatics (ICSI), vol. 123, Issue 13, pp.46-50, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I.H. Witten, “The WEKA Data Mining Software: An Update”, SIGKDD Explorations, Vol. 11, Issue 1, pp. 10-18 ,2009.

S. Ansari, J. Gadge, “Architecture For Checking Trustworthiness Of Websites”, International Journal of Computer Application, Vol. 44, Issue 14, pp. 22-26, 2012.

M. Shukla, S. Sharma, "A Comparative Study of Existing Data Mining Techniques for Phishing Detection", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.182-187, 2017.

Ma, Justin, et al. "Beyond blacklists: learning to detect malicious web sites from suspicious URLs." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp.681-688, 2009.

Nguyen, Luong Anh Tuan, ‘A novel approach for phishing detection using URL-based heuristic.” Computing, Management and Telecommunications (ComManTel), International Conference on. IEEE, Vol. 2, Issue 8, pp. 55-64, 2014.

Zhang Y, Hong JI, Cranor LF, “CANTINA: a content based approach to detecting phishing web sites”, In: Proceedings of the 16th international conference on world wide web, Banff, pp. 639-648, 2007.

Xiang G, Hong J, Rose CP, Cranor L, “CANTINA: a feature-rich machine learning framework for detecting phishing web sites”, ACM Transaction, pp. 14-21, 2011.

Huang H, Qian L, Wang Y, “A SVM based technique to detect phishing URLs”.Information Technology Journal, vol. 11, Issue 7, pp 921-925,2012.

Liébana-Cabanillas F, Nogueras R, Herrera LJ, Guillén A, “Analysing user trust in electronic banking using data mining methods”, Expert Systems with Applications, vol. 40, Issue 14, pp. 5439-5447, 2013.

Li Y, Xiao R, Feng J, Zhao L, “A semi-supervised learning approach for detection of phishing webpages”, Optik, Volume 124, Issue 23, pp. 6027-6033, 2013.

R Islam, J Abawajy, “A multi-tier phishing detection and filtering approach”, Journal of Network and Computer Applications, Volume 36, Issue 1, pp. 324-335, 2013.

Chen X, Bose I, Leung ACM, Guo C, “Assessing the severity of phishing attacks: a hybrid data mining approach”, Decision Support Systems, vol. 50, Issue 4, pp. 662-672, 2011.

Nishanth KJ, Ravi V, Ankaiah N, Bose I, “Soft computing based imputation and hybrid data and text mining: the case of predicting the severity of phishing alerts”, Expert Systems with Applications, Vol 39, Issue 12,pp. 10583-10589, 2012.

Liu W, Deng X, Huang G, Fu AY, “An antiphishing strategy based on visual similarity assessment. IEEE Computer Society”, IEEE Internet Computing, vol. 6, Issue 10, pp. 2-19, 2006.

Medvet E, Kirda E, Kruegel C, “Visual-similarity-based phishing detection. SecureComm.”, In: Proceedings of the 4th international conference on Security and privacy in communication netowrks”, vol. 6, Issue 10 , pp 22–25, 2008.

Fu AY, Wenyin L, Deng X “Detecting phishing web pages with visual similarity assessment based on earth mover’s distance”, IEEE Trans Dependable Secure Computer, vol. 3, Issue 4, pp. 301-321, 2006.

A K Jain, B B Gupta, “Phishing Detection: Analysis of Visual Similarity Based Approaches”, Hindawi Security and Communication Networks, vol. 4, Issue 8, pp.21-38, 2017.

Downloads

Published

2017-06-30

How to Cite

[1]
M. Shukla and S. Sharma, “Analysis of Efficient Classification Algorithm for Detection of Phishing Site”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 3, pp. 136–141, Jun. 2017.

Issue

Section

Research Article