An Ensemble Approach for Detecting Phishing Attacks

Authors

  • Agrawal h Department of Computer Science & Engineering, MITS, Gwalior, India
  • Ranjan Singh R Department of Computer Science & Engineering, MITS, Gwalior, India

DOI:

https://doi.org/10.26438/ijcse/v9i7.5359

Keywords:

Meta-algorithm, classification, web phishing, website, internet, cyber security.

Abstract

In cyberspace, phishing is one of several cybercrimes that often target internet users all over the world. Phishing performs by trying to trick the victim into accessing a web page which looks original, then instructing them to send important data. For prevention, it is essential to build a phishing detection system (PDS). Recent phishing detection system based on data mining and machine learning techniques. Development of an effective detection system while minimizing false positives and negatives is still a challenge. Instead of using single classification approach it would be better to use ensemble approach. In this work an ensemble approach is utilized to build a phishing website classification system. Bagging also known as Bootstrap Aggregating is a meta algorithm established to enhance the machine learning algorithms performance. To detect phishing website various classification models have been developed and implemented. It is observed that combination of Bagging, AdaBoost and j48 gives best results that is 97.2% accuracy.

References

[1] F. Furedi, “How the Internet and social media are changing culture,” 2015. [Accessed: 22-Apr-2019].

[2] M. Chewae, S. Hayikader, H. Hasan, and J. Ibrahim, “How Much Privacy We Still Have on Social Network?,” Int. J. Sci. Res. Publ., vol. 5, no. 1, pp. 1– 5, 2015.

[3] P. Patil, R. Rane, and M. Bhalekar, “Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm,” Proc. Int. Conf. Inven. Syst. Control. ICISC 2017, pp. 1–4, 2017.

[4] M. Ganesan and P. Mayilvahanan, “Cyber Crime Analysis in Social Media Using Data Mining Technique,” Int. J. Pure Appl. Math., vol. 116, no. 22, pp. 413–424, 2017.

[5] R. Pompon, D. Walkowski, S. Boddy, and M. Levin, “2018 Phishing and Fraud Report: Attacks Peak During the Holidays” 2018. [Accessed: 20- Apr-2019].

[6] Pritesh Saklecha, Jagdish Raikwar, "Prevention of Phishing Attack using Hybrid Blacklist Recommendation Algorithm", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.188-191, 2018.

[7] P.Priyadevi, V.Lalithadevi, M.Sughashini, "An Efficient and Usable Client-Side Phishing Detection Application", International Journal of Computer Sciences and Engineering, Vol.06, Special Issue.02, pp.398-401, 2018.

[8] M. Karabatak and T. Mustafa, “Performance comparison of classifiers on reduced phishing website dataset,” in International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 1– 5.

[9] A. Subasi, E. Molah, F. Almkallawi, and T. J. Chaudhery, “Intelligent phishing website detection using random forest classifier,” 2017 Int. Conf. Electr. Comput. Technol. Appl. ICECTA 2017, vol. 2018-January, pp. 1–5, 2018.

[10] R. M. Mohammad, F. Thabtah, and L. McCluskey, “Intelligent rule-based phishing websites classification,” IET Inf. Secur., vol. 8, no. 3, pp. 153– 160, 2014.

[11] L. Rahman, N. A. Setiawan, and A. E. Permanasari, “Feature Selection Methods in Improving Accuracyof Classifying Students’ Academic Performance,” 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. (ICITISEE)., no. 1, pp. 267–271, 2017.

[12] A. F. Nugraha, & L. Rahman, “Meta-Algorithms for Improving Classification Performance in the Web-phishing Detection Process”. In 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 271-275). IEEE.

[13] UCI Machine Learning, “UCI Machine Learning Repository?: Phising Websites Data Set,” 2019. [Accessed: 20-Apr-2019].

[14] R. M. Mohammad, F. Thabtah, and L. Mccluskey, “Phishing Websites Features,” Ieee. pp. 1–7, 2013.

[15] L. Breiman, “Bagging predictors,” Dep. Stat. Univ. Calif., no. 2, p. 19, 1994.

[16] L. Chen, “Basic Ensemble Learning (Random Forest, AdaBoost, Gradient Boosting)- Step by Step Explained,” 2016. [Accessed: 20-Apr-2019].

[17] Y. Freund and R. E. Schapire, “A Short Introduction to Boosting,” J. Japanese Soc. Artif. Intell., vol. 14, no. 5, pp. 771–780, 1999.

[18] V. Estivill-Castro, M. Lombardi, and A. Marani, “Improving binary classification of web pages using an ensemble of feature selection algorithms,” ACM Int. Conf. Proceeding Ser., 2018

[19] Md. Nurul Amin, Md. Ahsan Habib "Comparison of Different Classification Techniques Using WEKA for Hematological Data" American Journal of Engineering Research (AJER).

[20] N. Saravanan, V. Gayathari “Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)” In 2018 International Journal of Computational Intelligence and Informatics.

Downloads

Published

2021-07-31
CITATION
DOI: 10.26438/ijcse/v9i7.5359
Published: 2021-07-31

How to Cite

[1]
H. Agrawal and R. Ranjan Singh, “An Ensemble Approach for Detecting Phishing Attacks”, Int. J. Comp. Sci. Eng., vol. 9, no. 7, pp. 53–59, Jul. 2021.

Issue

Section

Research Article