On detecting and mitigating phishing attacks through featureless machine learning techniques

被引:2
作者
Martins de Souza, Cristian H. [1 ]
Lemos, Marcilio O. O. [1 ]
Dantas Silva, Felipe S. [1 ]
Souza Alves, Robinson L. [2 ]
机构
[1] IFRN, Fed Inst Educ Sci & Technol Rio Grande do Norte, LaTARC Res Lab, Natal, RN, Brazil
[2] IFRN, Fed Inst Educ Sci & Technol Rio Grande do Norte, DIATINF, Natal, RN, Brazil
关键词
attack detection; attack mitigation; machine learning; neural network; phishing;
D O I
10.1002/itl2.135
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The expansion of the Internet has grown the possibilities for fraudulent actions. Among these possibilities, we highlight the phishing activity, created with the objective of capturing user's credentials through a false page similar to the original one. This work proposes PhishKiller, a tool capable of detecting and mitigating phishing attacks by means a proxy approach employed to intercept user-accessed addresses, and featureless machine learning techniques to classify URLs. The proof-of-concept evaluation results revealed that PhishKiller has a more cost-effective compared to state of the art, with an accuracy of 98.30% and taking only 81.68 ms to predict and block malicious websites.
引用
收藏
页数:6
相关论文
共 14 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   A personalized whitelist approach for phishing webpage detection [J].
Belabed, A. ;
Aimeur, E. ;
Chikh, A. .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :249-254
[3]  
Desai A, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P1432, DOI 10.1109/RTEICT.2017.8256834
[4]  
Ishant T, 2018, NOVEL MACHINE LEARNI, P425
[5]   Towards detection of phishing websites on client-side using machine learning based approach [J].
Jain, Ankit Kumar ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 68 (04) :687-700
[6]   PhishStorm: Detecting Phishing With Streaming Analytics [J].
Marchal, Samuel ;
Francois, Jerome ;
State, Radu ;
Engel, Thomas .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (04) :458-471
[7]  
Marzano A., 2018, EVOLUTION BASHLITE M
[8]  
Niakanlahiji A, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P220, DOI 10.1109/ISI.2018.8587410
[9]  
Proofpoint I, 2014, PROOFP UNC INT THING
[10]   Machine Learning for Network Automation: Overview, Architecture, and Applications [Invited Tutorial] [J].
Rafique, Danish ;
Velasco, Luis .
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2018, 10 (10) :D126-D143