Phishing website detection using support vector machines and nature-inspired optimization algorithms

被引:0
作者
Sagnik Anupam
Arpan Kumar Kar
机构
[1] DPS RK Puram,Department of Management Studies
[2] Indian Institute of Technology,undefined
来源
Telecommunication Systems | 2021年 / 76卷
关键词
Phishing; Machine learning; Swarm intelligence; Classification; Cybersecurity;
D O I
暂无
中图分类号
学科分类号
摘要
Phishing websites are amongst the biggest threats Internet users face today, and existing methods like blacklisting, using SSL certificates, etc. often fail to keep up with the increasing number of threats. This paper aims to utilise different properties of a website URL, and use a machine learning model to classify websites as phishing and non-phishing. These properties include the IP address length, the authenticity of the HTTPs request being sent by the website, usage of pop-up windows to enter data, Server Form Handler status, etc. A Support Vector Machine binary classifier trained on an existing dataset has been used to predict if a website was a legitimate website or not, by finding an optimum hyperplane to separate the two categories. This optimum hyperplane is found with the help of four optimization algorithms, the Bat Algorithm, the Firefly Algorithm, the Grey Wolf Optimiser algorithm and the Whale Optimization Algorithm, which are inspired by various natural phenomena. Amongst the four nature-inspired optimization algorithms, it has been determined that the Grey Wolf Optimiser algorithm’s performance is significantly better than that of the Firefly Algorithm, but there is no significant difference while comparing the performance of any other pair of algorithms. However, all four nature-inspired optimization algorithms perform significantly better than the grid-search optimized Random Forest classifier model described in earlier research.
引用
收藏
页码:17 / 32
页数:15
相关论文
共 103 条
  • [11] Chiasson S(2015)Comparisons of machine learning techniques for detecting malicious webpages Expert Systems with Applications 42 1166-1177
  • [12] Adebowale MA(2018)State-of-art approaches for review spammer detection: A survey Journal of Intelligent Information Systems 50 231-264
  • [13] Lwin KT(1995)Support-vector networks Machine Learning 20 273-297
  • [14] Sanchez E(2011)LIBSVM: A library for support vector machines ACM Transactions on Intelligent Systems and Technology (TIST) 2 1-27
  • [15] Hossain MA(2014)A support vector machine-firefly algorithm based forecasting model to determine malaria transmission Neurocomputing 129 279-288
  • [16] Jagadeesan S(2015)The construction of support vector machine classifier using the firefly algorithm Computational Intelligence and Neuroscience 2015 2-2830
  • [17] Kumar A(2011)Scikit-learn: Machine learning in python Journal of Machine Learning Research 12 2825-32
  • [18] Kumar S(2016)Bio inspired computing-A review of algorithms and scope of applications Expert Systems with Applications 59 20-530
  • [19] Abdelhamid N(2014)A new particle swarm feature selection method for classification Journal of Intelligent Information Systems 42 507-67
  • [20] Ayesh A(2016)The whale optimization algorithm Advances in Engineering Software 95 51-61