Phishing website detection using support vector machines and nature-inspired optimization algorithms

被引:33
作者
Anupam, Sagnik [1 ]
Kar, Arpan Kumar [2 ]
机构
[1] DPS RK Puram, New Delhi 110022, India
[2] Indian Inst Technol, Dept Management Studies, New Delhi 110016, India
关键词
Phishing; Machine learning; Swarm intelligence; Classification; Cybersecurity; PROTECTION SCHEME; FEATURES; SYSTEM; MODEL;
D O I
10.1007/s11235-020-00739-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Phishing websites are amongst the biggest threats Internet users face today, and existing methods like blacklisting, using SSL certificates, etc. often fail to keep up with the increasing number of threats. This paper aims to utilise different properties of a website URL, and use a machine learning model to classify websites as phishing and non-phishing. These properties include the IP address length, the authenticity of the HTTPs request being sent by the website, usage of pop-up windows to enter data, Server Form Handler status, etc. A Support Vector Machine binary classifier trained on an existing dataset has been used to predict if a website was a legitimate website or not, by finding an optimum hyperplane to separate the two categories. This optimum hyperplane is found with the help of four optimization algorithms, the Bat Algorithm, the Firefly Algorithm, the Grey Wolf Optimiser algorithm and the Whale Optimization Algorithm, which are inspired by various natural phenomena. Amongst the four nature-inspired optimization algorithms, it has been determined that the Grey Wolf Optimiser algorithm's performance is significantly better than that of the Firefly Algorithm, but there is no significant difference while comparing the performance of any other pair of algorithms. However, all four nature-inspired optimization algorithms perform significantly better than the grid-search optimized Random Forest classifier model described in earlier research.
引用
收藏
页码:17 / 32
页数:16
相关论文
共 63 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]  
Aburrous Maher, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P176, DOI 10.1109/ITNG.2010.117
[3]   Intelligent phishing detection system for e-banking using fuzzy data mining [J].
Aburrous, Maher ;
Hossain, M. A. ;
Dahal, Keshav ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) :7913-7921
[4]   Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text [J].
Adebowale, M. A. ;
Lwin, K. T. ;
Sanchez, E. ;
Hossain, M. A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 115 :300-313
[5]   PhishZoo: Detecting Phishing Websites By Looking at Them [J].
Afroz, Sadia ;
Greenstadt, Rachel .
FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, :368-375
[6]   Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts [J].
Al-Zoubi, Ala' M. ;
Faris, Hossam ;
Alqatawna, Ja'far ;
Hassonah, Mohammad A. .
KNOWLEDGE-BASED SYSTEMS, 2018, 153 :91-104
[7]  
Alexa Inc, 2018, AR AL TRAFF RANK DET
[8]  
Ali Hasnain, 2018, Procedia Computer Science, V132, P880, DOI 10.1016/j.procs.2018.05.100
[9]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[10]  
[Anonymous], 2005, SPECIAL INTEREST TRA