Intelligent phishing detection and protection scheme for online transactions

被引:56
作者
Barraclough, P. A. [1 ]
Hossain, M. A. [1 ]
Tahir, M. A. [2 ]
Sexton, G. [1 ]
Aslam, N. [1 ]
机构
[1] Univ Northumbria Newcastle, Computat Intelligence Grp, Newcastle Upon Tyne NE1, Tyne & Wear, England
[2] Al Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & Informat Sci, Riyadh 11432, Saudi Arabia
关键词
Phishing; Neuro-Fuzzy scheme; Legitimate site rules; Online transaction; SYSTEM;
D O I
10.1016/j.eswa.2013.02.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Phishing is an instance of social engineering techniques used to deceive users into giving their sensitive information using an illegitimate website that looks and feels exactly like the target organization website. Most phishing detection approaches utilizes Uniform Resource Locator (URL) blacklists or phishing website features combined with machine learning techniques to combat phishing. Despite the existing approaches that utilize URL blacklists, they cannot generalize well with new phishing attacks due to human weakness in verifying blacklists, while the existing feature-based methods suffer high false positive rates and insufficient phishing features. As a result, this leads to an inadequacy in the online transactions. To solve this problem robustly, the proposed study introduces new inputs (Legitimate site rules, User-behavior profile, PhishTank, User-specific sites, Pop-Ups from emails) which were not considered previously in a single protection platform. The idea is to utilize a Neuro-Fuzzy Scheme with 5 inputs to detect phishing sites with high accuracy in real-time. In this study, 2-Fold cross-validation is applied for training and testing the proposed model. A total of 288 features with 5 inputs were used and has so far achieved the best performance as compared to all previously reported results in the field. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:4697 / 4706
页数:10
相关论文
共 32 条
  • [1] Abraham Ajith, 2005, FUZZY SYSTEMS ENG, P914
  • [2] Intelligent phishing detection system for e-banking using fuzzy data mining
    Aburrous, Maher
    Hossain, M. A.
    Dahal, Keshav
    Thabtah, Fadi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7913 - 7921
  • [3] PhishZoo: Detecting Phishing Websites By Looking at Them
    Afroz, Sadia
    Greenstadt, Rachel
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 368 - 375
  • [4] [Anonymous], 2009, P 6 C EM ANT MOUNT V
  • [5] [Anonymous], P INT MULT COMP SCI
  • [6] Bharat R. R., 2008, DANGERS CROSS VALIDA
  • [7] An Adaptive Network-Based Fuzzy Inference System (ANFIS) for the prediction of stock market return: The case of the Istanbul Stock Exchange
    Boyacioglu, Melek Acar
    Avci, Derya
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7908 - 7912
  • [8] Carter D., 2012, ONLINE BANK FRAUD RI
  • [9] Detecting Visually Similar Web Pages: Application to Phishing Detection
    Chen, Teh-Chung
    Dick, Scott
    Miller, James
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2010, 10 (02)
  • [10] Cranor L.F., 2007, P NDSS S 2007 SAN DI, P1