Intelligent phishing url detection using association rule mining

被引:66
作者
Jeeva, S. Carolin [1 ]
Rajsingh, Elijah Blessing [2 ]
机构
[1] Karunya Univ, Dept Comp Applicat, Coimbatore, Tamil Nadu, India
[2] Karunya Univ, Coimbatore, Tamil Nadu, India
关键词
Phishing; Web security; Association rule mining;
D O I
10.1186/s13673-016-0064-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk for web users and annoying threat within the field of electronic commerce. This paper focuses on discerning the significant features that discriminate between legitimate and phishing URLs. These features are then subjected to associative rule mining-apriori and predictive apriori. The rules obtained are interpreted to emphasize the features that are more prevalent in phishing URLs. Analyzing the knowledge accessible on phishing URL and considering confidence as an indicator, the features like transport layer security, unavailability of the top level domain in the URL and keyword within the path portion of the URL were found to be sensible indicators for phishing URL. In addition to this number of slashes in the URL, dot in the host portion of the URL and length of the URL are also the key factors for phishing URL.
引用
收藏
页数:19
相关论文
共 22 条
  • [1] Phishing detection based Associative Classification data mining
    Abdelhamid, Neda
    Ayesh, Aladdin
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) : 5948 - 5959
  • [2] Intelligent phishing detection system for e-banking using fuzzy data mining
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7913 - 7921
  • [3] Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
  • [4] [Anonymous], 2008, P 4 INT C SEC PRIV C
  • [5] [Anonymous], P 5 EUR C PRINC PRAC
  • [6] Fighting Phishing with Discriminative Keypoint Features
    Chen, Kuan-Ta
    Huang, Chun-Rong
    Chen, Chu-Song
    Chen, Jau-Yuan
    [J]. IEEE INTERNET COMPUTING, 2009, 13 (03) : 56 - 63
  • [7] Assessing the severity of phishing attacks: A hybrid data mining approach
    Chen, Xi
    Bose, Indranil
    Leung, Alvin Chung Man
    Guo, Chenhui
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 662 - 672
  • [8] Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
    Fu, Anthony Y.
    Wenyin, Liu
    Deng, Xiaotie
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 301 - 311
  • [9] Using automated individual white-list to protect web digital identities
    Han, Weili
    Cao, Ye
    Bertino, Elisa
    Yong, Jianming
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (15) : 11861 - 11869
  • [10] An efficient phishing webpage detector
    He, Mingxing
    Horng, Shi-Jinn
    Fan, Pingzhi
    Khan, Muhammad Khurram
    Run, Ray-Shine
    Lai, Jui-Lin
    Chen, Rong-Jian
    Sutanto, Adi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (10) : 12018 - 12027