A keyword-based combination approach for detecting phishing webpages

被引:37
作者
Ding, Yan [1 ]
Luktarhan, Nurbol [1 ]
Li, Keqin [2 ]
Slamu, Wushour [1 ]
机构
[1] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi, Peoples R China
[2] SUNY Coll New Paltz, Dept Comp Sci, New Paltz, NY USA
基金
中国博士后科学基金;
关键词
Heuristic rule; Machine learning; Phishing; Search engine; URL obfuscation techniques;
D O I
10.1016/j.cose.2019.03.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the Search & Heuristic Rule & Logistic Regression (SHLR) combination detection method is proposed for detecting the obfuscation techniques commonly used by phishing websites and improving the filtering efficiency of legitimate webpages. The method is composed of three steps. First, the title tag content of the webpage is input as search keywords to the Baidu search engine, and the webpage is considered legal if the webpage domain matches the domain name of any of the top-10 search results; otherwise, further evaluation is performed. Second, if the webpage cannot be identified as legal, then the webpage is further examined to determine whether it is a phishing page based on the heuristic rules defined by the character features. The first two steps can quickly filter webpages to meet the needs of real-time detection. Finally, a logistic regression classifier is used to assess the remaining pages to enhance the adaptability and accuracy of the detection method. The experimental results show that the SHLR can filter 61.9% of legitimate webpages and identify 22.9% of phishing webpages based on uniform/universal resource locator (URL) lexical information. The accuracy of the SHLR is 98.9%; thus, its phishing detection performance is high. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:256 / 275
页数:20
相关论文
共 51 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[3]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[4]  
[Anonymous], NETW DISTR SYST SEC
[5]  
[Anonymous], PRACT CLIN J INTEGR
[6]  
APWG, 2017, REP APWG INT POL COM
[7]  
Bilge L., 2011, P NDSS SAN DIEG CA
[8]  
Blythe M, 2011, 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, P3469
[9]  
Chang E.H., 2013, IT Convergence and Security (ICITCS), 2013 International Conference on, P1
[10]  
Chiba Daiki, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P491, DOI 10.1109/DSN.2016.51