New rule-based phishing detection method

被引:124
|
作者
Moghimi, Mahmood [1 ]
Varjani, Ali Yazdian [1 ]
机构
[1] Tarbiat Modares Univ, Fac Elect & Comp Engn, Jalal Ale Ahmad Highway, Tehran 14115111, Iran
关键词
Phishing; Internet banking; Classification; SVM; Sensitivity analysis; Browser extension; Rule-based; PREDICTION; PROTECTION; FRAMEWORK; WEBSITES; MACHINE; MODEL;
D O I
10.1016/j.eswa.2016.01.028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new rule-based method to detect phishing attacks in internet banking. Our rule-based method used two novel feature sets, which have been proposed to determine the webpage identity. Our proposed feature sets include four features to evaluate the page resources identity, and four features to identify the access protocol of page resource elements. We used approximate string matching algorithms to determine the relationship between the content and the URL of a page in our first proposed feature set. Our proposed features are independent from third-party services such as search engines result and/or web browser history. We employed support vector machine (SVM) algorithm to classify web pages. Our experiments indicate that the proposed model can detect phishing pages in internet banking with accuracy of 99.14% true positive and only 0.86% false negative alarm. Output of sensitivity analysis demonstrates the significant impact of our proposed features over traditional features. We extracted the hidden knowledge from the proposed SVM model by adopting a related method. We embedded the extracted rules into a browser extension named PhishDetector to make our proposed method more functional and easy to use. Evaluating of the implemented browser extension indicates that it can detect phishing attacks in internet banking with high accuracy and reliability. PhishDetector can detect zero-day phishing attacks too. (c) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:231 / 242
页数:12
相关论文
共 50 条
  • [41] Do Americans Have a Preference for Rule-Based Classification?
    Murphy, Gregory L.
    Bosch, David A.
    Kim, ShinWoo
    COGNITIVE SCIENCE, 2017, 41 (08) : 2026 - 2052
  • [42] The Neural Correlates of Similarity- and Rule-based Generalization
    Milton, Fraser
    Bealing, Pippa
    Carpenter, Kathryn L.
    Bennattayallah, Abdelmalek
    Wills, Andy J.
    JOURNAL OF COGNITIVE NEUROSCIENCE, 2017, 29 (01) : 150 - 166
  • [43] A minimum centre distance rule activation method for extended belief rule-based classification systems
    Zhu, Haizhen
    Xiao, Mingqing
    Yang, Longhao
    Tang, Xilang
    Liang, Yajun
    Li, Jianfeng
    APPLIED SOFT COMPUTING, 2020, 91
  • [44] Intelligent phishing url detection using association rule mining
    Jeeva, S. Carolin
    Rajsingh, Elijah Blessing
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2016, 6
  • [45] Comparison of upscaling cropland and non-cropland map using uncertainty weighted majority rule-based and the majority rule-based aggregation methods
    Sun, Peijun
    Pan, Yaozhong
    Zhang, Jinshui
    GEOCARTO INTERNATIONAL, 2019, 34 (02) : 149 - 163
  • [47] A new rule-based power-aware job scheduler for supercomputers
    Jun Wang
    Dezhi Han
    Ruijun Wang
    The Journal of Supercomputing, 2018, 74 : 2508 - 2527
  • [48] A novel rule generation and activation method for extended belief rule-based system based on improved decision tree
    Ma, Junwen
    Zhang, An
    Gao, Fei
    Bi, Wenhao
    Tang, Changhong
    APPLIED INTELLIGENCE, 2023, 53 (07) : 7355 - 7368
  • [49] A new fuzzy rule-based classification system for word sense disambiguation
    Fakhrahmad, S. M.
    Rezapour, A. R.
    Jahromi, M. Zolghadri
    Sadreddini, M. H.
    INTELLIGENT DATA ANALYSIS, 2012, 16 (04) : 633 - 648
  • [50] Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection
    Awotunde, Joseph Bamidele
    Chakraborty, Chinmay
    Adeniyi, Abidemi Emmanuel
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021