New rule-based phishing detection method

被引:124
|
作者
Moghimi, Mahmood [1 ]
Varjani, Ali Yazdian [1 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Jalal Ale Ahmad Highway, Tehran 14115111, Iran
关键词
Phishing; Internet banking; Classification; SVM; Sensitivity analysis; Browser extension; Rule-based; PREDICTION; PROTECTION; FRAMEWORK; WEBSITES; MACHINE; MODEL;
D O I
10.1016/j.eswa.2016.01.028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new rule-based method to detect phishing attacks in internet banking. Our rule-based method used two novel feature sets, which have been proposed to determine the webpage identity. Our proposed feature sets include four features to evaluate the page resources identity, and four features to identify the access protocol of page resource elements. We used approximate string matching algorithms to determine the relationship between the content and the URL of a page in our first proposed feature set. Our proposed features are independent from third-party services such as search engines result and/or web browser history. We employed support vector machine (SVM) algorithm to classify web pages. Our experiments indicate that the proposed model can detect phishing pages in internet banking with accuracy of 99.14% true positive and only 0.86% false negative alarm. Output of sensitivity analysis demonstrates the significant impact of our proposed features over traditional features. We extracted the hidden knowledge from the proposed SVM model by adopting a related method. We embedded the extracted rules into a browser extension named PhishDetector to make our proposed method more functional and easy to use. Evaluating of the implemented browser extension indicates that it can detect phishing attacks in internet banking with high accuracy and reliability. PhishDetector can detect zero-day phishing attacks too. (c) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:231 / 242
页数:12
相关论文
共 50 条
  • [1] Spherical Classification of Data, a New Rule-Based Learning Method
    Zhengyu Ma
    Hong Seo Ryoo
    Journal of Classification, 2021, 38 : 44 - 71
  • [2] Detection of epilepsy with Electroencephalogram using rule-based classifiers
    Wang, Guanjin
    Deng, Zhaohong
    Choi, Kup-Sze
    NEUROCOMPUTING, 2017, 228 : 283 - 290
  • [3] A lightweight and proactive rule-based incremental construction approach to detect phishing scam
    M. SatheeshKumar
    K. G. Srinivasagan
    G. UnniKrishnan
    Information Technology and Management, 2022, 23 : 271 - 298
  • [4] Spherical Classification of Data, a New Rule-Based Learning Method
    Ma, Zhengyu
    Ryoo, Hong Seo
    JOURNAL OF CLASSIFICATION, 2021, 38 (01) : 44 - 71
  • [5] A lightweight and proactive rule-based incremental construction approach to detect phishing scam
    SatheeshKumar, M.
    Srinivasagan, K. G.
    UnniKrishnan, G.
    INFORMATION TECHNOLOGY & MANAGEMENT, 2022, 23 (04) : 271 - 298
  • [6] Rule-Based Method for Entity Resolution
    Li, Lingli
    Li, Jianzhong
    Gao, Hong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (01) : 250 - 263
  • [7] A new method for Detection of Phishing Websites: URL Detection
    Parekh, Shraddha
    Parikh, Dhwanil
    Kotak, Srushti
    Sankhe, Smita
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 949 - 952
  • [8] DNS rule-based schema to botnet detection
    Alieyan, Kamal
    Almomani, Ammar
    Anbar, Mohammed
    Alauthman, Mohammad
    Abdullah, Rosni
    Gupta, B. B.
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 545 - 564
  • [9] INTELLIGENT TREE-BASED ENSEMBLE APPROACHES FOR PHISHING WEBSITE DETECTION
    Alsariera, Yazan A.
    Balogun, Abdullateef O.
    Adeyemo, Victor E.
    Tarawneh, Omar H.
    Mojeed, Hammed A.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (01): : 563 - 582
  • [10] A rule-based automatic sleep staging method
    Liang, Sheng-Fu
    Kuo, Chin-En
    Hu, Yu-Han
    Cheng, Yu-Shian
    JOURNAL OF NEUROSCIENCE METHODS, 2012, 205 (01) : 169 - 176