Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

06-07-2016

Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining

Authors: R. Aravindhan, R. Shanmugalakshmi, K. Ramya

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the current era of technological advancement, the access to the internet has predominantly increased due to plethoric hand held devices. All day–day activities which require time and energy are being been done effortlessly in the blink of an eye. This extreme sophistication rendered to the mobile Wi-Fi users prorogues them to do all pecuniary transaction through mobile phones. A Wi-Fi hotspot which connects such hand held devices has become a temporary repository of sensitive information, thereby giving an opportunity for hackers to accrue monetary gain. Therefore information security policies addressing Wi-Fi hotspots (Wi-Fi phishing attack) has become the need of the hour. The possible ways to attack the security of Wi-Fi hotspots and counter-attack mechanisms has been addressed in this paper. In this paper a live Wi-Fi Phishing attack has been demonstrated and a novel approach based on association rule mining to circumvent the same has been discussed in this paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
7.
go back to reference computer.howstuffworks.com/wireless-network.htm. computer.howstuffworks.com/wireless-network.htm.
12.
go back to reference Aydin, M., &Baykal, N. (2015). Feature extraction and classification phishing websites based on URL. In 2015 IEEE Conference on Communications and Network Security (CNS), pp. 769–770. Aydin, M., &Baykal, N. (2015). Feature extraction and classification phishing websites based on URL. In 2015 IEEE Conference on Communications and Network Security (CNS), pp. 769–770.
13.
go back to reference Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel Phishing classification based on URL features. In 2011 IEEE GCC Conference and Exhibition (GCC), pp. 221–224. Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel Phishing classification based on URL features. In 2011 IEEE GCC Conference and Exhibition (GCC), pp. 221–224.
14.
go back to reference Mallik, S., & Mukhopadhyay, A. RANWAR: Rank-based weighted association rule mining from gene expression and methylation data. IEEE Transactions on Nano Bioscience. Mallik, S., & Mukhopadhyay, A. RANWAR: Rank-based weighted association rule mining from gene expression and methylation data. IEEE Transactions on Nano Bioscience.
15.
go back to reference Soltani, A., & Akbarzadeh-T, M.-R. Confabulation-inspired association rule mining for rare and frequent itemsets. IEEE Transactions on Neural Networks and Learning Systems. Soltani, A., & Akbarzadeh-T, M.-R. Confabulation-inspired association rule mining for rare and frequent itemsets. IEEE Transactions on Neural Networks and Learning Systems.
17.
go back to reference Kesler, B., Drinan, H., & Fontaine, N. (2006). News briefs. IEEE Security and Privacy, 4(2), 8–13.CrossRef Kesler, B., Drinan, H., & Fontaine, N. (2006). News briefs. IEEE Security and Privacy, 4(2), 8–13.CrossRef
18.
go back to reference Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007). A framework for detection and measurement of phishing attacks. In WORM ‘07: Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 1–8, New York, NY, USA, 2007. ACM. Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007). A framework for detection and measurement of phishing attacks. In WORM ‘07: Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 1–8, New York, NY, USA, 2007. ACM.
19.
go back to reference Pan, Y., & Ding, X. (2006). Anomaly based web phishing page detection. In ACSAC ‘06: Proceedings of the 22nd Annual Computer Security-Applications Conference, pp. 381–392, Washington, DC, USA, 2006. IEEE Computer Society. Pan, Y., & Ding, X. (2006). Anomaly based web phishing page detection. In ACSAC ‘06: Proceedings of the 22nd Annual Computer Security-Applications Conference, pp. 381–392, Washington, DC, USA, 2006. IEEE Computer Society.
20.
go back to reference Dunlop, M., Groat, S., & Shelly, D. (2010). GoldPhish: Using images for content-based phishing analysis. In The fifth international conference on internet monitoring and protection, Virginia Polytechnic Institute and State University, Blacksburg, VA 24060, USA, 2010. Dunlop, M., Groat, S., & Shelly, D. (2010). GoldPhish: Using images for content-based phishing analysis. In The fifth international conference on internet monitoring and protection, Virginia Polytechnic Institute and State University, Blacksburg, VA 24060, USA, 2010.
21.
go back to reference Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E. P. Detecting social network profile cloning. Foundation for Research and Technology Hellas—Institute of Computer Science. Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E. P. Detecting social network profile cloning. Foundation for Research and Technology Hellas—Institute of Computer Science.
22.
go back to reference Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel phishing classification based on url features. In 2011 IEEE GCC conference and exhibition (GCC), Dubai, United Arab Emirates, 2011. Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel phishing classification based on url features. In 2011 IEEE GCC conference and exhibition (GCC), Dubai, United Arab Emirates, 2011.
24.
go back to reference Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010a). Predicting phishing websites using classification mining techniques with experimental case studies. In Seventh International Conference on Information Technology, IEEE Conf, LasVegas, Nevada, USA, (pp. 176–181). Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010a). Predicting phishing websites using classification mining techniques with experimental case studies. In Seventh International Conference on Information Technology, IEEE Conf, LasVegas, Nevada, USA, (pp. 176–181).
25.
go back to reference Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010b). Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37(12), 7913–7921 Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010b). Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37(12), 7913–7921
26.
go back to reference Shahriar, H., Zulkernine, M. (2010). Trustworthiness testing of phishing websites: A behavior model-based approach. In Future Generation Computer Systems. School of Computing, Queen‘s University, Kingston, Canada. Shahriar, H., Zulkernine, M. (2010). Trustworthiness testing of phishing websites: A behavior model-based approach. In Future Generation Computer Systems. School of Computing, Queen‘s University, Kingston, Canada.
27.
go back to reference Barraclough, P. A., Hossain, M. A., Tahir, M. A., Sexton, G., & Aslam, N. (2013). Intelligent phishing detection and protection scheme for online transactions. Expert Systems with Applications, 40, 4697–4706.CrossRef Barraclough, P. A., Hossain, M. A., Tahir, M. A., Sexton, G., & Aslam, N. (2013). Intelligent phishing detection and protection scheme for online transactions. Expert Systems with Applications, 40, 4697–4706.CrossRef
29.
go back to reference Agrawal, R., Imieliński, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In SIGMOD ‘93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data. Agrawal, R., Imieliński, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In SIGMOD ‘93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data.
30.
go back to reference Abdelhamid, N., Ayesh, A., & Thabtah, F. (2013) Associative classification mining for website phishing classification. In Proceedings of the ICAI ‘2013, pp. 687–695, USA. Abdelhamid, N., Ayesh, A., & Thabtah, F. (2013) Associative classification mining for website phishing classification. In Proceedings of the ICAI ‘2013, pp. 687–695, USA.
31.
go back to reference Kuoa, R. J., Chao, C. M., & Chiuc, Y. T. (2011). Application of particle swarm optimization to association rule mining. Applied Soft Computing, 11, 326–336.CrossRef Kuoa, R. J., Chao, C. M., & Chiuc, Y. T. (2011). Application of particle swarm optimization to association rule mining. Applied Soft Computing, 11, 326–336.CrossRef
32.
go back to reference Wur, S.-Y., & Leu, Y. (1999). An effective boolean algorithm for mining association rules in large databases. In Proceeding DASFAA ‘99 Proceedings of the sixth international conference on database systems for advanced applications, pp. 179–186. Wur, S.-Y., & Leu, Y. (1999). An effective boolean algorithm for mining association rules in large databases. In Proceeding DASFAA ‘99 Proceedings of the sixth international conference on database systems for advanced applications, pp. 179–186.
33.
go back to reference Kung, S. H. (2002). Applying genetic algorithm and weight item to association rule. Master Thesis, Department of Industrial Engineering and Management, Yuan Ze University, Taiwan. Kung, S. H. (2002). Applying genetic algorithm and weight item to association rule. Master Thesis, Department of Industrial Engineering and Management, Yuan Ze University, Taiwan.
Metadata
Title
Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining
Authors
R. Aravindhan
R. Shanmugalakshmi
K. Ramya
Publication date
06-07-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3451-1

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue