Full Paper View Go Back

Analysis of Efficient Classification Algorithm for Detection of Phishing Site

Meenu Shukla1 , Sanjiv Sharma2

  1. Department of CSE/IT, Madhav Institute of Technology and Science, Gwalior, India.
  2. Department of CSE/IT, Madhav Institute of Technology and Science, Gwalior, India.

Correspondence should be addressed to: shuklameenu03@gmail.com.


Section:Research Paper, Product Type: Isroset-Journal
Vol.5 , Issue.3 , pp.136-141, Jun-2017


Online published on Jun 30, 2017


Copyright © Meenu Shukla, Sanjiv Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Meenu Shukla, Sanjiv Sharma, “Analysis of Efficient Classification Algorithm for Detection of Phishing Site,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.136-141, 2017.

MLA Style Citation: Meenu Shukla, Sanjiv Sharma "Analysis of Efficient Classification Algorithm for Detection of Phishing Site." International Journal of Scientific Research in Computer Science and Engineering 5.3 (2017): 136-141.

APA Style Citation: Meenu Shukla, Sanjiv Sharma, (2017). Analysis of Efficient Classification Algorithm for Detection of Phishing Site. International Journal of Scientific Research in Computer Science and Engineering, 5(3), 136-141.

BibTex Style Citation:
@article{Shukla_2017,
author = {Meenu Shukla, Sanjiv Sharma},
title = {Analysis of Efficient Classification Algorithm for Detection of Phishing Site},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {136-141},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=410},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=410
TI - Analysis of Efficient Classification Algorithm for Detection of Phishing Site
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Meenu Shukla, Sanjiv Sharma
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 136-141
IS - 3
VL - 5
SN - 2347-2693
ER -

470 Views    296 Downloads    193 Downloads
  
  

Abstract :
Phishing is mainly related to steal the confidential information and personal data of web users by making duplicate of the original one in which the content and images are almost similar to the legitimate website with small changes. Other method of phishing is to make changes in the URL that is approximately similar to legitimate website. Here we have discussed the different methods for phishing detection and some of the disadvantages of them. In this paper, we proposed phishing detection on the basis of web source and uses uniform resource locator (URL) features. We identified the features that contained in the phishing URLs. The technique is evaluated with a dataset of phishing URLs and White List URLs. The results evaluated shows that with this technique we are able to detect more phishing sites.

Key-Words / Index Term :
Phishing sites, URL based features, Web Source Based Features, Machine learning, and Random Forest

References :
[1] J. Hong, “The state of phishing attacks”, Communications of the ACM, vol. 55, Issue 1, pp. 74-81, 2012.
[2] A. Sardana, A Naga Venkata Sunil, “A PageRank Based Detection Technique for Phishing Web Sites”, IEEE Symposium on Computer and Informatics (ICSI), vol. 123, Issue 13, pp.46-50, 2012.
[3] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I.H. Witten, “The WEKA Data Mining Software: An Update”, SIGKDD Explorations, Vol. 11, Issue 1, pp. 10-18 ,2009.
[4] S. Ansari, J. Gadge, “Architecture For Checking Trustworthiness Of Websites”, International Journal of Computer Application, Vol. 44, Issue 14, pp. 22-26, 2012.
[5] M. Shukla, S. Sharma, "A Comparative Study of Existing Data Mining Techniques for Phishing Detection", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.182-187, 2017.
[6] Ma, Justin, et al. "Beyond blacklists: learning to detect malicious web sites from suspicious URLs." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp.681-688, 2009.
[7] Nguyen, Luong Anh Tuan, ‘A novel approach for phishing detection using URL-based heuristic.” Computing, Management and Telecommunications (ComManTel), International Conference on. IEEE, Vol. 2, Issue 8, pp. 55-64, 2014.
[8] Zhang Y, Hong JI, Cranor LF, “CANTINA: a content based approach to detecting phishing web sites”, In: Proceedings of the 16th international conference on world wide web, Banff, pp. 639-648, 2007.
[9] Xiang G, Hong J, Rose CP, Cranor L, “CANTINA: a feature-rich machine learning framework for detecting phishing web sites”, ACM Transaction, pp. 14-21, 2011.
[10] Huang H, Qian L, Wang Y, “A SVM based technique to detect phishing URLs”.Information Technology Journal, vol. 11, Issue 7, pp 921-925,2012.
[11] LiĂ©bana-Cabanillas F, Nogueras R, Herrera LJ, GuillĂ©n A, “Analysing user trust in electronic banking using data mining methods”, Expert Systems with Applications, vol. 40, Issue 14, pp. 5439-5447, 2013.
[12] Li Y, Xiao R, Feng J, Zhao L, “A semi-supervised learning approach for detection of phishing webpages”, Optik, Volume 124, Issue 23, pp. 6027-6033, 2013.
[13] R Islam, J Abawajy, “A multi-tier phishing detection and filtering approach”, Journal of Network and Computer Applications, Volume 36, Issue 1, pp. 324-335, 2013.
[14] Chen X, Bose I, Leung ACM, Guo C, “Assessing the severity of phishing attacks: a hybrid data mining approach”, Decision Support Systems, vol. 50, Issue 4, pp. 662-672, 2011.
[15] Nishanth KJ, Ravi V, Ankaiah N, Bose I, “Soft computing based imputation and hybrid data and text mining: the case of predicting the severity of phishing alerts”, Expert Systems with Applications, Vol 39, Issue 12,pp. 10583-10589, 2012.
[16] Liu W, Deng X, Huang G, Fu AY, “An antiphishing strategy based on visual similarity assessment. IEEE Computer Society”, IEEE Internet Computing, vol. 6, Issue 10, pp. 2-19, 2006.
[17] Medvet E, Kirda E, Kruegel C, “Visual-similarity-based phishing detection. SecureComm.”, In: Proceedings of the 4th international conference on Security and privacy in communication netowrks”, vol. 6, Issue 10 , pp 22–25, 2008.
[18] Fu AY, Wenyin L, Deng X “Detecting phishing web pages with visual similarity assessment based on earth mover’s distance”, IEEE Trans Dependable Secure Computer, vol. 3, Issue 4, pp. 301-321, 2006.
[19] A K Jain, B B Gupta, “Phishing Detection: Analysis of Visual Similarity Based Approaches”, Hindawi Security and Communication Networks, vol. 4, Issue 8, pp.21-38, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation