Phishing detection method based on URL features

被引:5
作者
机构
[1] School of Computer Science and Engineering, Southeast University
[2] Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University
[3] Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics
来源
Cao, J. (jx.cao@seu.edu.cn) | 1600年 / Southeast University卷 / 29期
关键词
Incremental learning; Phishing detection; Support vector machine; Uniform resource locator (URL) features;
D O I
10.3969/j.issn.1003-7985.2013.02.005
中图分类号
学科分类号
摘要
In order to effectively detect malicious phishing behaviors, a phishing detection method based on the uniform resource locator (URL) features is proposed. First, the method compares the phishing URLs with legal ones to extract the features of phishing URLs. Then a machine learning algorithm is applied to obtain the URL classification model from the sample data set training. In order to adapt to the change of a phishing URL, the classification model should be constantly updated according to the new samples. So, an incremental learning algorithm based on the feedback of the original sample data set is designed. The experiments verify that the combination of the URL features extracted in this paper and the support vector machine (SVM) classification algorithm can achieve a high phishing detection accuracy, and the incremental learning algorithm is also effective. © Copy Right.
引用
收藏
页码:134 / 138
页数:4
相关论文
共 12 条
[1]  
Phishing
[2]  
Phishing activity trends report
[3]  
Chandrasekaran M., Narayanan K., Upadhyaya S., Phishing email detection based on structural properties, NYS Cyber Security Conference, pp. 2-8, (2006)
[4]  
Zhang Y., Hong J.I., Cranor L.F., Cantina: A content-based approach to detecting phishing web sites, 16th International World Wide Web Conference, pp. 639-648, (2007)
[5]  
Fu A.Y., Liu W.Y., Deng X.T., Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD), IEEE Transactions on Dependable and Secure Computing, 3, 4, pp. 301-311, (2006)
[6]  
Cao J., Mao B., Luo J., Et al., A phishing web pages detection algorithm based on nested structure of earth mover's distance (nested-EMD), Chinese Journal of Computers, 32, 5, pp. 922-929, (2009)
[7]  
Garera S., Provos N., Chew M., Et al., A framework for detection and measurement of phishing attacks, Proceedings of the 2007 ACM Workshop on Recurring Maicode, pp. 1-8, (2007)
[8]  
Smith T.F., Waterman M.S., Identification of common molecular subsequences, Journal of Molecular Biology, 147, 1, pp. 195-197, (1981)
[9]  
Chang C.C., Lin C.J., LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, 2, 3, pp. 1-27, (2011)
[10]  
Domeniconi C., Gunopulos D., Incremental support vector machine construction, Proceedings of IEEE International Conference on Data Mining, pp. 589-592, (2001)