Intelligent phishing detection system for e-banking using fuzzy data mining

被引:103
作者
Aburrous, Maher [1 ]
Hossain, M. A. [1 ]
Dahal, Keshav [1 ]
Thabtah, Fadi [2 ]
机构
[1] Univ Bradford, Dept Comp, Bradford BD7 1DP, W Yorkshire, England
[2] Philadelphia Univ Amman, MIS Dept, Amman, Jordan
关键词
Phishing; Fuzzy logic; Data mining; Classification; Association; Apriori; E-banking risk assessment;
D O I
10.1016/j.eswa.2010.04.044
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is really a complex and dynamic problem involving many factors and criteria. Because of the subjective considerations and the ambiguities involved in the detection, fuzzy data mining techniques can be an effective tool in assessing and identifying phishing websites for e-banking since it offers a more natural way of dealing with quality factors rather than exact values. In this paper, we present novel approach to overcome the 'fuzziness' in the e-banking phishing website assessment and propose an intelligent resilient and effective model for detecting e-banking phishing websites. The proposed model is based on fuzzy logic combined with data mining algorithms to characterize the e-banking phishing website factors and to investigate its techniques by classifying the phishing types and defining six e-banking phishing website attack criteria's with a layer structure. Our experimental results showed the significance and importance of the e-banking phishing website criteria (URL & Domain Identity) represented by layer one and the various influence of the phishing characteristic on the final e-banking phishing website rate. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:7913 / 7921
页数:9
相关论文
共 40 条
  • [1] ADIDA B, 2005, USENIX STEPS RED UNW
  • [2] [Anonymous], [No title captured]
  • [3] [Anonymous], CMUISRI06112
  • [4] [Anonymous], 1994, P 20 INT C VER LARG
  • [5] *ANT WORK GROUP, 2007, PHISH ACT TRENDS REP
  • [6] BRIDGES SM, 2001, FUZZY DATA MINING GE
  • [7] PRISM - AN ALGORITHM FOR INDUCING MODULAR RULES
    CENDROWSKA, J
    [J]. INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1987, 27 (04): : 349 - 370
  • [8] CIESIELSKI V, P 3 INT C H IN PRESS, P1034
  • [9] DHAMIJA R, 2005, P S
  • [10] Dhamija R., 2006, WHY PHISHING WORKS