Phishing website detection using support vector machines and nature-inspired optimization algorithms

被引:0
作者
Sagnik Anupam
Arpan Kumar Kar
机构
[1] DPS RK Puram,Department of Management Studies
[2] Indian Institute of Technology,undefined
来源
Telecommunication Systems | 2021年 / 76卷
关键词
Phishing; Machine learning; Swarm intelligence; Classification; Cybersecurity;
D O I
暂无
中图分类号
学科分类号
摘要
Phishing websites are amongst the biggest threats Internet users face today, and existing methods like blacklisting, using SSL certificates, etc. often fail to keep up with the increasing number of threats. This paper aims to utilise different properties of a website URL, and use a machine learning model to classify websites as phishing and non-phishing. These properties include the IP address length, the authenticity of the HTTPs request being sent by the website, usage of pop-up windows to enter data, Server Form Handler status, etc. A Support Vector Machine binary classifier trained on an existing dataset has been used to predict if a website was a legitimate website or not, by finding an optimum hyperplane to separate the two categories. This optimum hyperplane is found with the help of four optimization algorithms, the Bat Algorithm, the Firefly Algorithm, the Grey Wolf Optimiser algorithm and the Whale Optimization Algorithm, which are inspired by various natural phenomena. Amongst the four nature-inspired optimization algorithms, it has been determined that the Grey Wolf Optimiser algorithm’s performance is significantly better than that of the Firefly Algorithm, but there is no significant difference while comparing the performance of any other pair of algorithms. However, all four nature-inspired optimization algorithms perform significantly better than the grid-search optimized Random Forest classifier model described in earlier research.
引用
收藏
页码:17 / 32
页数:15
相关论文
共 103 条
  • [1] Chiew KL(2018)A survey of phishing attacks: their types, vectors and technical approaches Expert Systems with Applications 106 1-20
  • [2] Yong KSC(2012)“Andromaly”: a behavioral malware detection framework for android devices Journal of Intelligent Information Systems. 38 161-190
  • [3] Tan CL(2015)Why phishing still works: User strategies for combating phishing attacks International Journal of Human-Computer Studies 82 69-82
  • [4] Shabtai A(2019)Intelligent web-phishing detection and protection scheme using integrated features of images, frames and text Expert Systems with Applications 115 300-313
  • [5] Kanonov U(2018)URL phishing analysis using random forest International Journal of Pure and Applied Mathematics 118 4159-4163
  • [6] Elovici Y(2014)Phishing detection based associative classification data mining Expert Systems with Applications 41 5948-5959
  • [7] Glezer C(2006)Detecting phishing web pages with visual similarity assessment based on Earth Mover’s Distance (EMD) IEEE Transactions on Dependable and Secure Computing 3 301-311
  • [8] Weiss Y(2013)Intelligent phishing detection and protection scheme for online transactions Expert Systems with Applications 40 4697-4706
  • [9] Alsharnouby M(2010)Intelligent phishing detection system for e-banking using fuzzy data mining Expert Systems with Applications 37 7913-7921
  • [10] Alaca F(2014)Predicting phishing websites based on self-structuring neural network Neural Computing and Applications 25 443-458