URL Based Gateway Side Phishing Detection Method

被引:0
作者
Zhang, Jianyi [1 ]
Pan, Yang [1 ]
Wang, Zhiqiang [1 ]
Liu, Biao [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Comp Sci & Technol, Beijing, Peoples R China
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
Anti-Phishing; Web document analysis; Information filtering;
D O I
10.1109/TrustCom.2016.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attack has become the most dangerous form of fraud to hit online and mobile businesses. In this paper, we reveal some new aspects of the common features that appear in the phishing URLs, and introduce a statistical machine learning classifier to detect the phishing sites which relies on these selected features. Unlike previous studies, we do not utilize a single model for different regions since the result of our analysis shows that the features in different phishing domains have mismatched distributions. As it is impossible for us to recollect enough data and rebuild the models, we adjust the existing model by the transfer learning algorithm to solve these problems. A number of comprehensive experiments show that our proposed method achieves more than 93% accuracy over a balanced dataset and less than 1% error rates in the simulated real phishing scene. Moreover, the well performance in the target domain demonstrates the use of transfer learning algorithm in the anti-phishing scenario is feasible.
引用
收藏
页码:268 / 275
页数:8
相关论文
共 25 条
  • [1] Aaron Greg, 2016, PHISHING ACTIVITY TR
  • [2] Abu-Nimeh S., 2007, P ANT WORK GROUPS 2, P60, DOI DOI 10.1145/1299015.1299021
  • [3] Intelligent phishing detection system for e-banking using fuzzy data mining
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7913 - 7921
  • [4] [Anonymous], 2009, P 6 C EM ANTISPAM CE
  • [5] [Anonymous], 1975, SIGNAL DETECTION THE
  • [6] [Anonymous], 2010, NDSS 10
  • [7] [Anonymous], P 14 ANN NETW DISTR
  • [8] [Anonymous], 2009, P 26 ANN INT C MACH, DOI DOI 10.1145/1553374.1553462
  • [9] Blum A., 2010, AISEC, P54
  • [10] Chang M.-w., 2008, Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, P97