An Ensemble Approach for Detecting Phishing Attacks
DOI:
https://doi.org/10.26438/ijcse/v9i7.5359Keywords:
Meta-algorithm, classification, web phishing, website, internet, cyber security.Abstract
In cyberspace, phishing is one of several cybercrimes that often target internet users all over the world. Phishing performs by trying to trick the victim into accessing a web page which looks original, then instructing them to send important data. For prevention, it is essential to build a phishing detection system (PDS). Recent phishing detection system based on data mining and machine learning techniques. Development of an effective detection system while minimizing false positives and negatives is still a challenge. Instead of using single classification approach it would be better to use ensemble approach. In this work an ensemble approach is utilized to build a phishing website classification system. Bagging also known as Bootstrap Aggregating is a meta algorithm established to enhance the machine learning algorithms performance. To detect phishing website various classification models have been developed and implemented. It is observed that combination of Bagging, AdaBoost and j48 gives best results that is 97.2% accuracy.
References
[1] F. Furedi, “How the Internet and social media are changing culture,” 2015. [Accessed: 22-Apr-2019].
[2] M. Chewae, S. Hayikader, H. Hasan, and J. Ibrahim, “How Much Privacy We Still Have on Social Network?,” Int. J. Sci. Res. Publ., vol. 5, no. 1, pp. 1– 5, 2015.
[3] P. Patil, R. Rane, and M. Bhalekar, “Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm,” Proc. Int. Conf. Inven. Syst. Control. ICISC 2017, pp. 1–4, 2017.
[4] M. Ganesan and P. Mayilvahanan, “Cyber Crime Analysis in Social Media Using Data Mining Technique,” Int. J. Pure Appl. Math., vol. 116, no. 22, pp. 413–424, 2017.
[5] R. Pompon, D. Walkowski, S. Boddy, and M. Levin, “2018 Phishing and Fraud Report: Attacks Peak During the Holidays” 2018. [Accessed: 20- Apr-2019].
[6] Pritesh Saklecha, Jagdish Raikwar, "Prevention of Phishing Attack using Hybrid Blacklist Recommendation Algorithm", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.188-191, 2018.
[7] P.Priyadevi, V.Lalithadevi, M.Sughashini, "An Efficient and Usable Client-Side Phishing Detection Application", International Journal of Computer Sciences and Engineering, Vol.06, Special Issue.02, pp.398-401, 2018.
[8] M. Karabatak and T. Mustafa, “Performance comparison of classifiers on reduced phishing website dataset,” in International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 1– 5.
[9] A. Subasi, E. Molah, F. Almkallawi, and T. J. Chaudhery, “Intelligent phishing website detection using random forest classifier,” 2017 Int. Conf. Electr. Comput. Technol. Appl. ICECTA 2017, vol. 2018-January, pp. 1–5, 2018.
[10] R. M. Mohammad, F. Thabtah, and L. McCluskey, “Intelligent rule-based phishing websites classification,” IET Inf. Secur., vol. 8, no. 3, pp. 153– 160, 2014.
[11] L. Rahman, N. A. Setiawan, and A. E. Permanasari, “Feature Selection Methods in Improving Accuracyof Classifying Students’ Academic Performance,” 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. (ICITISEE)., no. 1, pp. 267–271, 2017.
[12] A. F. Nugraha, & L. Rahman, “Meta-Algorithms for Improving Classification Performance in the Web-phishing Detection Process”. In 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 271-275). IEEE.
[13] UCI Machine Learning, “UCI Machine Learning Repository?: Phising Websites Data Set,” 2019. [Accessed: 20-Apr-2019].
[14] R. M. Mohammad, F. Thabtah, and L. Mccluskey, “Phishing Websites Features,” Ieee. pp. 1–7, 2013.
[15] L. Breiman, “Bagging predictors,” Dep. Stat. Univ. Calif., no. 2, p. 19, 1994.
[16] L. Chen, “Basic Ensemble Learning (Random Forest, AdaBoost, Gradient Boosting)- Step by Step Explained,” 2016. [Accessed: 20-Apr-2019].
[17] Y. Freund and R. E. Schapire, “A Short Introduction to Boosting,” J. Japanese Soc. Artif. Intell., vol. 14, no. 5, pp. 771–780, 1999.
[18] V. Estivill-Castro, M. Lombardi, and A. Marani, “Improving binary classification of web pages using an ensemble of feature selection algorithms,” ACM Int. Conf. Proceeding Ser., 2018
[19] Md. Nurul Amin, Md. Ahsan Habib "Comparison of Different Classification Techniques Using WEKA for Hematological Data" American Journal of Engineering Research (AJER).
[20] N. Saravanan, V. Gayathari “Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)” In 2018 International Journal of Computational Intelligence and Informatics.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
