Heuristic nonlinear regression strategy for detecting phishing websites

被引:59
作者
Babagoli, Mehdi [1 ]
Aghababa, Mohammad Pourmahmood [2 ]
Solouk, Vahid [1 ]
机构
[1] Urmia Univ Technol, Fac Comp Engn, Orumiyeh, Iran
[2] Urmia Univ Technol, Fac Elect Engn, Orumiyeh, Iran
关键词
Phishing; SVM; Harmony search; Feature selection; Decision tree; Wrapper; Nonlinear regression; HARMONY SEARCH ALGORITHM; CLASSIFICATION;
D O I
10.1007/s00500-018-3084-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a method of phishing website detection that utilizes a meta-heuristic-based nonlinear regression algorithm together with a feature selection approach. In order to validate the proposed method, we used a dataset comprised of 11055 phishing and legitimate webpages, and select 20 features to be extracted from the mentioned websites. This research utilizes two feature selection methods: decision tree and wrapper to select the best feature subset, while the latter incurred the detection accuracy rate as high as 96.32%. After the feature selection process, two meta-heuristic algorithms are successfully implemented to predict and detect the fraudulent websites: harmony search (HS) which was deployed based on nonlinear regression technique and support vector machine (SVM). The nonlinear regression approach was used to classify the websites, where the parameters of the proposed regression model were obtained using HS algorithm. The proposed HS algorithm uses dynamic pitch adjustment rate and generated new harmony. The nonlinear regression based on HS led to accuracy rates of 94.13 and 92.80% for train and test processes, respectively. As a result, the study finds that the nonlinear regression-based HS results in better performance compared to SVM.
引用
收藏
页码:4315 / 4327
页数:13
相关论文
共 38 条
  • [1] Phishing detection based Associative Classification data mining
    Abdelhamid, Neda
    Ayesh, Aladdin
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) : 5948 - 5959
  • [2] Aburrous M, 2008, 3 INT C INF COMM TEC, P1
  • [3] Intelligent phishing detection system for e-banking using fuzzy data mining
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7913 - 7921
  • [4] A fuzzy discrete harmony search algorithm applied to annual cost reduction in radial distribution systems
    Ameli, Kazem
    Alfi, Alireza
    Aghaebrahimi, Mohammadreza
    [J]. ENGINEERING OPTIMIZATION, 2016, 48 (09) : 1529 - 1549
  • [5] [Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
  • [6] Basnet R, 2008, STUD FUZZ SOFT COMP, V226, P373, DOI 10.1007/978-3-540-77465-5_19
  • [7] Bottazzi Giovanni, 2015, 2015 IEEE International Conferences on Computer and Information Technology
  • [8] Ubiquitous Computing and Communications
  • [9] Dependable, Autonomic and Secure Computing
  • [10] MP-Shield: A Framework for Phishing Detection in Mobile Devices
    Bottazzi, G.
    Casalicchio, E.
    Cingolani, D.
    Marturana, F.
    Piu, M.
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1978 - 1984