Browser Extension based Hybrid Anti-Phishing Framework using Feature Selection

被引:0
作者
Maurya, Swati [1 ]
Saini, Harpreet Singh
Jain, Anurag [1 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, New Delhi, India
关键词
Anti-phishing; browser extension; machine learning; feature selection;
D O I
10.14569/IJACSA.2019.0101178
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Phishing is one of the socially engineered cybersecurity attacks where the attacker impersonates a genuine and legitimate website source and sends emails with the intention of stealing sensitive personal information. The phishing websites' URLs are usually spread through emails by luring the users to click on them or by embedding the link to fake website replicating any genuine e-commerce website inside the invoice or other documents. The phishing problem is very wide and no single solution exists to mitigate all the vulnerabilities properly. Thus, multiple techniques are often combined and implemented to mitigate specific attacks. The primary objective of this paper is to propose an efficient and effective anti-phishing solution that can be implemented at the client-side in the form of a browser extension and should be capable to handle real-time scenarios and zero-day attacks. The proposed approach works efficiently for any phishing link carrier mode as the execution on clicking on any link or manually entering URL in the browser doesn't proceed unless the proposed framework approves that the website associated with that URL is genuine. Also, the proposed framework is capable to handle DNS cache poisoning attacks even if the system's DNS cache is somehow infected. This paper first presents a comprehensive review that broadly discusses the phishing life cycle and available anti-phishing countermeasures. The proposed framework considers the pros and cons of existing methodologies and presents a robust solution by combining the best features to ensure that a fast and accurate response is achieved. The effectiveness of the approach is tested in a real-time dataset consisting of live phishing and legitimate website URLs and the framework is found to be 98.1% accurate in identifying websites correctly in very less time.
引用
收藏
页码:579 / 588
页数:10
相关论文
共 22 条
[1]   Classification of Phishing Email Using Random Forest Machine Learning Technique [J].
Akinyelu, Andronicus A. ;
Adewumi, Aderemi O. .
JOURNAL OF APPLIED MATHEMATICS, 2014,
[2]  
[Anonymous], 1997, MACH LEARN
[3]  
[Anonymous], 1993, MORGAN KAUFMANN SERI
[4]  
[Anonymous], 1999, An Overview of Statistical Learning Theory
[5]  
[Anonymous], 5 INT C CYB COMP FOR
[6]  
[Anonymous], DESTECH T COMPUTER S
[7]  
[Anonymous], MACH LEARN MACH LEARN
[8]  
[Anonymous], INDIAN J SCI TECHNOL
[9]   A personalized whitelist approach for phishing webpage detection [J].
Belabed, A. ;
Aimeur, E. ;
Chikh, A. .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :249-254
[10]   A keyword-based combination approach for detecting phishing webpages [J].
Ding, Yan ;
Luktarhan, Nurbol ;
Li, Keqin ;
Slamu, Wushour .
COMPUTERS & SECURITY, 2019, 84 :256-275