Phishing Websites Detection using Machine Learning

被引:0
作者
Kulkarni, Arun [1 ]
Brown, Leonard L., III [1 ]
机构
[1] Univ Texas Tyler, Dept Comp Sci, Tyler, TX 75799 USA
关键词
Phishing websites; classification; features; machine learning;
D O I
10.14569/ijacsa.2019.0100702
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are tricked into interacting with web pages that appear to be legitimate. In order to successfully fool a human user, these pages are designed to look like legitimate ones. Since humans are so susceptible to being tricked, automated methods of differentiating between phishing websites and their authentic counterparts are needed as an extra line of defense. The aim of this research is to develop these methods of defense utilizing various approaches to categorize websites. Specifically, we have developed a system that uses machine learning techniques to classify websites based on their URL. We used four classifiers: the decision tree, Naive Bayesian classifier, support vector machine (SVM), and neural network. The classifiers were tested with a data set containing 1,353 real world URLs where each could be categorized as a legitimate site, suspicious site, or phishing site. The results of the experiments show that the classifiers were successful in distinguishing real websites from fake ones over 90% of the time.
引用
收藏
页码:8 / 13
页数:6
相关论文
共 15 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]  
[Anonymous], 2016, P 3 INT C DIG SEC FO
[3]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[4]  
Gallant S. I., 1993, Neural Network Learning and Expert Systems
[5]   A new fast associative classification algorithm for detecting phishing websites [J].
Hadi, Wa'el ;
Aburub, Faisal ;
Alhawari, Samer .
APPLIED SOFT COMPUTING, 2016, 48 :729-734
[6]  
Han J, 2012, MOR KAUF D, P1
[7]   Practical Exhaustive Optimization Phase Order Exploration and Evaluation [J].
Kulkarni, Prasad A. ;
Whalley, David B. ;
Tyson, Gary S. ;
Davidson, Jack W. .
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2009, 6 (01)
[8]  
Lippmann R. P., 1987, IEEE ASSP Magazine, V4, P4, DOI 10.1145/44571.44572
[9]  
Lord N., 2018, WHAT IS PHISHING ATT
[10]   Learning to Detect Malicious URLs [J].
Ma, Justin ;
Saul, Lawrence K. ;
Savage, Stefan ;
Voelker, Geoffrey M. .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)