Phishing Detection Using Ensemble of Classifiers

被引:1
作者
Daza, David Raphael M. [1 ]
Tabuco, Frank Cally A. [1 ]
Naval, Prospero C., Jr. [1 ]
机构
[1] Univ Philippines Diliman, Quezon City, Philippines
来源
RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I | 2024年 / 2144卷
关键词
Ensemble methods; Feature selection; Phishing; MODEL;
D O I
10.1007/978-981-97-5937-8_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing remains to be a major cybersecurity threat despite its long history. We explore URL-based phishing detection using ensemble methods and recursive feature selection. URL-based approaches extract features from different substrings of the URL. It is also common for approaches to use external features such as indexing and time domain response. Our results suggest that for ensembles, the parameters substring does not contribute to phishing detection while the directory substring consistently provides important features. Google-based features are also not important to ensembles. Our best performing ensemble is an AdaBoost classifier which uses both external and substring features, with an accuracy of 93.74% and 0.00001 s average prediction time.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 17 条
[1]   An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL [J].
Aljofey, Ali ;
Jiang, Qingshan ;
Qu, Qiang ;
Huang, Mingqing ;
Niyigena, Jean-Pierre .
ELECTRONICS, 2020, 9 (09) :1-24
[2]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[3]  
[Anonymous], 2017, Quarterly Threat Trends, V2017
[4]   SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective [J].
Das, Avisha ;
Baki, Shahryar ;
El Aassal, Ayman ;
Verma, Rakesh ;
Dunbar, Arthur .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :671-708
[5]  
Dhamija R., 2006, P SIGCHI C HUMAN FAC, P581
[6]  
Kern C., 2007, Foundations of Security: What Every Programmer Needs to Know, DOI [10.1007/978-1-4302-0377-3, DOI 10.1007/978-1-4302-0377-3]
[7]  
Le H, 2018, Arxiv, DOI arXiv:1802.03162
[8]  
Naval P.C., 2020, Classifier ensembles
[9]  
Rekouche K, 2011, Arxiv, DOI arXiv:1106.4692
[10]  
Rivas R., 2020, Rappler