RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web
DOI:
https://doi.org/10.26438/ijcse/v5i9.7478Keywords:
Phishing URL, Phishing URLHyperlinkAbstract
Phishing is a form of internet fraud in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users' confidential or sensitive credentials by imitating electronic communications from a trustworthy or from the public organization in an automated fashion. There is an need of identify the phishing websites in this emerging digital era. Based on the URL and content based features of websites like length of URL, domain’s age, WHOIS properties, etc, we can draw an algorithm to identify the phishing websites. Furthermore, our approach checks the legitimacy of a webpage using hyperlink features. Hyperlinks are extracted from the source code of the given website and apply that into the proposed algorithm to detect phishing site. Our experiment shows that our proposed algorithm is very effective to detect the phishing websites and it have 89.16% True Positive Rate while greater than 82% of accuracy.
References
S. Abu-Nimeh and S. Nair, “Bypassing security toolbars and phishing filters via dns poisoning” In IEEE GLOBECOM: Global Telecommunications Conference, 2008.
S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, “Who falls for phish? : a demographic analysis of phishing susceptibility and effectiveness of interventions” in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI ’10. New York, NY, USA: ACM, 2010, pp. 373–382.
B. Krebs, “HBGary Federal hacked by Anonymous” http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011, accessed December 2011.
V Karamchand Gandhi, “An Overview Study on Cyber crimes in Internet” Journal of Information Engineering and Applications from IISTE, Volume 2, Number 1, pages 1-5, February 2012. ISSN 2224-5782 (Paper) ISSN 2225-0506 (Online).
Google safe browsing API Available at: https://developers.google.com/safe-browsing/. Accessed 30 Nov 2015.
W Liu, X Deng, G Huang, AY Fu, “An antiphishing strategy based on visual similarity assessment”, IEEE Internet Comput. 10(2), 58–65 (2006)
VP Reddy, V Radha, M Jindal, “Client side protection from phishing attack”, International Journal of advanced Engineering Science Technology 3(1), 039–045 (2011)
A. Z. Broder, “Identifying and filtering near-duplicate documents”, In COM ’00: Proceedings of the 11th Annual Symposium on Combinatorial Pattern Matching, pages 1–10, London, UK, 2000. Springer-Verlag.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
