Performing Efficient Phishing Webpage Detection
Keywords:
Phishing, SVM, Gaussian, Fuzzy Logic, Feature collectionAbstract
Along with deployment of internet, saving financial and sensitive information becomes more inconvenient. One of the problems faced today is growing number of phishing websites. Phishing websites are fake webpage shaped and used by phishers to copy the web pages of legitimate websites which results in lack of faith in internet based services and causes financial loss to the internet users. So it has become crucial to search for useful solution applicable for such phishing websites. Therefore, establishing useful solution for mitigating phishing websites is essential to reduce the incident of being victimized by phishing attack. This research paper employs approach that uses fuzzy logic with classifiers like SVM, NMC and Gaussian. Fuzzy based detection system provides effective aid in detecting phishing websites. It successfully resulted in low false positive and high true positive for classifying phishing websites.
References
. Aburrous, M., Hossain, M.A.; Thabatah, F.; and Dahal, K. (2008): Intelligent phishing website detection system using fuzzy techniques. Information and Communication Technologies: From Theory to Applications. ICTTA. April 7-11, 2008, pp.1-6.
. Cyren report<http://ir.cyren.com/releasedetail.cfm?releaseid=911178> accessed june 2015.
. The Economic Times news <http://economictimes.indiatimes.com/topic/phishing> accessed july 2015.
. Andrew H.Sung, Ram Basenet, Srinivas Mukkamala.(2008) “Detection of Phishing Attacks: A machine Learning Approach”. InB. Parsad, editor, Springer ,Soft Computing Applications in Industry, Studies in Fuzziness and Soft Computing, volume 226, pages 373–383.
. Anh Le,Athina Markopoulou,Michalis Faloutsos:PhishDef: URL Names Say it All.
. Santhana Lakshmi V, Vijaya MS, (2012) : Efficient prediction of phishing websites using supervised learning algorithms, Procedia Engineering 30 pp.798 – 805.
. Jiang, Hansi; Zhang, Dongsong; and Yan, Zhijun (2013):A Classification Model for Detection of Chinese Phishing E-Business Websites, PACIS Proceedings, Paper 152.
. Rami M. Mohammad, Fadi Thabtah.(2012): An assessment of features related to phishing websites using an automated technique. Internet Technology and Secured Transactions, pp-492-497.
. Adi Sutanto, Jui-Lin Lai, Muhammad Khurram Khan, Mingxing He, Pingzhi, Rong-Jian Chen,, Ray-Shine Run, Shi-Jinn Horng,(2011):An efficient phishing webpage detector. Expert Systems with Applications,38, pp.12018–12027.
. Comparison of generalization properties of statistical and neural classifiers available at< http://www.mif.vu.lt/~valdas/PhD/TEXT/CHAPTER4.pdf>.
. PhishTank. [Online]. Available from: http://www.phishtank.com/.
. Antiphishing Working Group, Available from: www.antiphishing.org/reports/apwg-reports.
. Zhang, Y., Hong, J., and Cranor, L. (2007). CANTINA: A Content-Based Approach to Detecting Phishing Websites. Proceedings of the 16th International Conference on World Wide Web. pp. 639-648.
. Rashmi Gupta, Nivit Gill. (2013): Token Based Security for Prevention of Phishing Attack at Client Side. International Journal of Emerging Technologies in Computational and Applied Sciences, pp.184-189.
. Ram B. Basnet, Andrew H. Sung, Quingzhong Liu.(2014): Learning to detect phishing urls. IJRET: International Journal of Research in Engineering and Technology, pp.11-14.
. Mingxing He, Horng SJ, Fan P, Khan MK, Run RS, Lai JL, Chen RJ.(2011) “An efficient phishing webpage detector. Expert Systems with Applications”, An International Journal. pp. 12018-12027.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
