A semi-supervised learning approach for detection of phishing webpages

被引:25
作者
Li, Yuancheng [1 ,2 ]
Xiao, Rui [1 ]
Feng, Jingang [1 ]
Zhao, Liujun [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] North China Elect Power Univ, State Key Lab Alternate Elect Power Syst Renewabl, Beijing 102206, Peoples R China
来源
OPTIK | 2013年 / 124卷 / 23期
关键词
Phishing webpage detection; Web image; Features extraction; TSVM; Classifier;
D O I
10.1016/j.ijleo.2013.04.078
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a new phishing webpage detection approach based on a kind of semi-supervised learning method-transductive support vector machine (TSVM). Firstly the features of web image are extracted for complementing the disadvantage of phishing detection only based on document object model (DOM); they include gray histogram, color histogram, and spatial relationship between subgraphs. Then the features of sensitive information are examined by using page analysis based on DOM objects. In contrast to the drawback of support vector machine (SVM) algorithm which simply trains classifier by learning little and poor representative labeled samples, this method introduces the TSVM to train classifier that it takes into account the distribution information implicitly embodied in the large quantity of the unlabeled samples, and have better performance than SVM. The experimental results show that the proposed method not only achieves better classification accuracy, but also has strong applicability as the independent method of phishing detection. (C) 2013 Elsevier GmbH. All rights reserved.
引用
收藏
页码:6027 / 6033
页数:7
相关论文
共 24 条
[1]  
Abu-Nimeh S., 2007, P ANT WORK GROUPS 2, P60, DOI DOI 10.1145/1299015.1299021
[2]  
[Anonymous], 2006, BOOK REV IEEE T NEUR
[3]  
[Anonymous], 2005, SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania
[4]  
Anti-Phishing Working Group (APWG), 2007, PHISH ACT TRENDS REP
[5]   Learning with progressive transductive support vector machine [J].
Chen, YS ;
Wang, GP ;
Dong, SH .
PATTERN RECOGNITION LETTERS, 2003, 24 (12) :1845-1855
[6]  
Coronges K., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2366, DOI 10.1109/HICSS.2012.657
[7]   Training Johnny to Authenticate (Safely) [J].
Herzberg, Amir ;
Margulies, Ronen .
IEEE SECURITY & PRIVACY, 2012, 10 (01) :37-45
[8]  
James D., 2012, 2012 IEEE Custom Integrated Circuits Conference - CICC 2012, DOI 10.1109/CICC.2012.6330644
[9]  
Joachims T., 2011, SVMLIGHT SUPPORT VEC
[10]  
Khonji M., 2011, 2011 IEEE GCC Conference and Exhibition (GCC), P221, DOI 10.1109/IEEEGCC.2011.5752505