A systematic literature review on phishing website detection techniques

被引:36
作者
Safi, Asadullah [1 ]
Singh, Satwinder [2 ]
机构
[1] Nangarhar Univ, Minist Higher Educ, Jalalabad, Afghanistan
[2] Cent Univ Punjab, Dept Comp Sci & Technol, Bathinda, Punjab, India
关键词
Phishing; Phishing Detection; Deep Learning; Cyber Security; Machine Learning; FEATURES;
D O I
10.1016/j.jksuci.2023.01.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain sensitive information from an internet user. In this Systematic Literature Survey (SLR), different phishing detection approaches, namely Lists Based, Visual Similarity, Heuristic, Machine Learning, and Deep Learning based techniques, are studied and compared. For this purpose, several algorithms, data sets, and techniques for phishing website detection are revealed with the proposed research questions. A systematic Literature survey was conducted on 80 scientific papers published in the last five years in research journals, confer-ences, leading workshops, the thesis of researchers, book chapters, and from high-rank websites. The work carried out in this study is an update in the previous systematic literature surveys with more focus on the latest trends in phishing detection techniques. This study enhances readers' understanding of dif-ferent types of phishing website detection techniques, the data sets used, and the comparative perfor-mance of algorithms used. Machine Learning techniques have been applied the most, i.e., 57 as per studies, according to the SLR. In addition, the survey revealed that while gathering the data sets, research -ers primarily accessed two sources: 53 studies accessed the PhishTank website (53 for the phishing data set) and 29 studies used Alexa's website for downloading legitimate data sets. Also, as per the literature survey, most studies used Machine Learning techniques; 31 used Random Forest Classifier. Finally, as per different studies, Convolution Neural Network (CNN) achieved the highest Accuracy, 99.98%, for detecting phishing websites.& COPY; 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:590 / 611
页数:22
相关论文
共 103 条
[91]   Everything Is in the Name - A URL Based Approach for Phishing Detection [J].
Tupsamudre, Harshal ;
Singh, Ajeet Kumar ;
Lodha, Sachin .
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 :231-248
[92]   Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection [J].
van Dooremaal, Bram ;
Burda, Pavlo ;
Allodi, Luca ;
Zannone, Nicola .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
[93]  
Wang Y., 2020, INT C CYBER SECURITY, DOI DOI 10.1109/CYBERSECURITY49315.2020.9138873
[94]   Accurate and fast URL phishing detector: A convolutional neural network approach [J].
Wei, Wei ;
Ke, Qiao ;
Nowak, Jakub ;
Korytkowski, Marcin ;
Scherer, Rafal ;
Wozniak, Marcin .
COMPUTER NETWORKS, 2020, 178
[95]  
Weiheng Bai, 2020, 2020 International Conference on Computing and Data Science (CDS), P293, DOI 10.1109/CDS49703.2020.00064
[96]  
Yadollahi MM, 2019, 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), P281, DOI [10.1109/ICWR.2019.8765265, 10.1109/icwr.2019.8765265]
[97]   An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features [J].
Yang, Liqun ;
Zhang, Jiawei ;
Wang, Xiaozhe ;
Li, Zhi ;
Li, Zhoujun ;
He, Yueying .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 165
[98]   Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning [J].
Yang, Peng ;
Zhao, Guangzhen ;
Zeng, Peng .
IEEE ACCESS, 2019, 7 :15196-15209
[99]  
Zabihimayvan M, 2019, IEEE INT FUZZY SYST, DOI 10.1109/FUZZ-IEEE.2019.8858884
[100]   DTOF-ANN: An Artificial Neural Network phishing detection model based on Decision Tree and Optimal Features [J].
Zhu, Erzhou ;
Ju, Yinyin ;
Chen, Zhile ;
Liu, Feng ;
Fang, Xianyong .
APPLIED SOFT COMPUTING, 2020, 95