A visualization cybersecurity method based on features' dissimilarity

被引:12
作者
AlShboul, Rabah [1 ]
Thabtah, Fadi [2 ]
Abdelhamid, Neda [3 ]
Al-diabat, Mofleh [1 ]
机构
[1] Al Albayt Univ, Dept Comp Sci, Al Mafraq, Jordan
[2] Manukau Inst Technol, Digital Technol, Auckland, New Zealand
[3] Auckland Inst Studies, Informat Technol, Auckland, New Zealand
关键词
Cybersecurity; Data mining; Features extraction; Phishing; Expert rules; Web threats; Visualization; CLASSIFICATION; IMAGES;
D O I
10.1016/j.cose.2018.04.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks on websites are a serious problem that has seen a recent dramatic increase due to the higher volume of online financial transactions and advancements in computer network technology. One of the main challenges with existing intelligent phishing detection approaches is that despite their promising detection rates they do not provide novice users with alerting mechanisms in order to enrich users' experience and knowledge of deceptive techniques. This paper proposes a new anti-phishing technique that not only detects phishing websites accurately, but also offers to novice users an alerting mechanism with rich rules. The key to success in the proposed anti-phishing technique are the features that have been developed by using a hybrid feature analysis. These provide visual cues in the web browser when phishing attacks occur. The rich rules are derived using a fuzzy rule induction approach and they can be utilized by the novice users to understand the security issues of the phishing problem. To evaluate the proposed technique, several experiments have been conducted using feature selection methods and classification algorithms (Furia, SMO, AdaBoost, Naive Bayes, C4.5) against distinctive feature sets derived from a real phishing dataset. The results show that there are six features, which are not redundant, and when processed using Furia generate effective phishing detection models. More importantly, detection of these features is the basis of an alerting tool for pinpointing possible phishing attacks. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:289 / 303
页数:15
相关论文
共 49 条
  • [1] Associative Classification Approaches: Review and Comparison
    Abdelhamid, Neda
    Thabtah, Fadi
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2014, 13 (03)
  • [2] Phishing detection based Associative Classification data mining
    Abdelhamid, Neda
    Ayesh, Aladdin
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) : 5948 - 5959
  • [3] Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. COGNITIVE COMPUTATION, 2010, 2 (03) : 242 - 253
  • [4] Intelligent phishing detection system for e-banking using fuzzy data mining
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7913 - 7921
  • [5] Alkhozae MG, 2011, P INT J INFORM COMMU, V2011
  • [6] [Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
  • [7] [Anonymous], 2014, C4. 5: programs for machine learning
  • [8] [Anonymous], 2013, R LANG ENV STAT COMP
  • [9] [Anonymous], 2007, P 16 INT C WORLD WID
  • [10] Arachchilage N. A. G., 2011, 2011 International Conference on Information Society (i-Society), P485