New rule-based phishing detection method

被引:136
作者
Moghimi, Mahmood [1 ]
Varjani, Ali Yazdian [1 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Jalal Ale Ahmad Highway, Tehran 14115111, Iran
关键词
Phishing; Internet banking; Classification; SVM; Sensitivity analysis; Browser extension; Rule-based; PREDICTION; PROTECTION; FRAMEWORK; WEBSITES; MACHINE; MODEL;
D O I
10.1016/j.eswa.2016.01.028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new rule-based method to detect phishing attacks in internet banking. Our rule-based method used two novel feature sets, which have been proposed to determine the webpage identity. Our proposed feature sets include four features to evaluate the page resources identity, and four features to identify the access protocol of page resource elements. We used approximate string matching algorithms to determine the relationship between the content and the URL of a page in our first proposed feature set. Our proposed features are independent from third-party services such as search engines result and/or web browser history. We employed support vector machine (SVM) algorithm to classify web pages. Our experiments indicate that the proposed model can detect phishing pages in internet banking with accuracy of 99.14% true positive and only 0.86% false negative alarm. Output of sensitivity analysis demonstrates the significant impact of our proposed features over traditional features. We extracted the hidden knowledge from the proposed SVM model by adopting a related method. We embedded the extracted rules into a browser extension named PhishDetector to make our proposed method more functional and easy to use. Evaluating of the implemented browser extension indicates that it can detect phishing attacks in internet banking with high accuracy and reliability. PhishDetector can detect zero-day phishing attacks too. (c) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:231 / 242
页数:12
相关论文
共 31 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]  
Abu-Nimeh S., 2007, P ANT WORK GROUPS 2, P60, DOI DOI 10.1145/1299015.1299021
[3]   Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [J].
Aburrous, Maher ;
Hossain, M. A. ;
Dahal, Keshav ;
Thabtah, Fadi .
COGNITIVE COMPUTATION, 2010, 2 (03) :242-253
[4]   Intelligent phishing detection system for e-banking using fuzzy data mining [J].
Aburrous, Maher ;
Hossain, M. A. ;
Dahal, Keshav ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) :7913-7921
[5]  
Ajlouni M.I. A., 2013, Eur. J. Bus. Manag, V5, P36
[6]  
Alkhozae M. G., 2011, INT J INFORM COMMUNI, V1, P238
[7]  
Almomani Ammar, 2012, Journal of Computer Science, V8, P1099, DOI 10.3844/jcssp.2012.1099.1107
[8]  
[Anonymous], 2009, INTRO INFORM RETRIEV
[9]  
Arade MS., 2011, INT J COMPUTER SCI T, V2, P282
[10]  
Arun S., 2012, ADV COMPUTING INT J, V3, P81