Skip to main content
Top

2019 | OriginalPaper | Chapter

Comparative Evaluation of Techniques for Detection of Phishing URLs

Authors : Oluwafemi Osho, Ayanfeoluwa Oluyomi, Sanjay Misra, Ravin Ahuja, Robertas Damasevicius, Rytis Maskeliunas

Published in: Applied Informatics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

One of the popular cyberattacks today is phishing. It combines social engineering and online identity theft to delude Internet users into submitting their personal information to cybercriminals. Reports have shown continuous increase in the number and sophistication of this attack worldwide. Phishing Uniform Resource Locator (URL) is a malicious web address often created to look like legitimate URL, in order to deceive unsuspecting users. Many algorithms have been proposed to detect phishing URLs and classify them as benign or phishing. Most of these detection algorithms are based on machine learning and detect using inherent characteristics of the URLs. In this study, we examine the performance of a number of such techniques. The algorithms were tested using three publicly available datasets. Our results revealed, overall, the Random Forest algorithm as the best performing algorithm, achieving an accuracy of 97.3%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231–242 (2016)CrossRef Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231–242 (2016)CrossRef
2.
go back to reference Mohammad, R., Thabtah, F., Mccluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014)CrossRef Mohammad, R., Thabtah, F., Mccluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014)CrossRef
4.
go back to reference Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: IEEE International Congress on Big Data Phishing, pp. 635–638 (2015) Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: IEEE International Congress on Big Data Phishing, pp. 635–638 (2015)
5.
go back to reference Oluwafemi, O., Adesuyi, F.A., Abdulhamid, S.M.: Combating terrorism with cybersecurity: the nigerian perspective. World J. Comput. Appl. Technol. 1(4), 103–109 (2013) Oluwafemi, O., Adesuyi, F.A., Abdulhamid, S.M.: Combating terrorism with cybersecurity: the nigerian perspective. World J. Comput. Appl. Technol. 1(4), 103–109 (2013)
6.
go back to reference Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on Recurring malcode - WORM 2007, pp. 1–8 (2007) Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on Recurring malcode - WORM 2007, pp. 1–8 (2007)
7.
go back to reference Huang, H., Qian, L., Wang, Y.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(7), 921–925 (2012)CrossRef Huang, H., Qian, L., Wang, Y.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(7), 921–925 (2012)CrossRef
8.
go back to reference Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 60–69 (2007) Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 60–69 (2007)
9.
go back to reference Lee, J., Kim, D., Lee, C.-H.: Heuristic-based approach for phishing site detection using URL features. In: 3rd International Conference on Advances in Computing, Electronics and Electrical Technology - CEET 2015, pp. 131–135 Lee, J., Kim, D., Lee, C.-H.: Heuristic-based approach for phishing site detection using URL features. In: 3rd International Conference on Advances in Computing, Electronics and Electrical Technology - CEET 2015, pp. 131–135
10.
go back to reference Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)CrossRef Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)CrossRef
12.
go back to reference Fu, A.Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301–311 (2006)CrossRef Fu, A.Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301–311 (2006)CrossRef
13.
go back to reference Khonji, M., Iraqi, Y., Jones, A.: Lexical URL analysis for discriminating phishing and legitimate websites. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 109–115 (2011) Khonji, M., Iraqi, Y., Jones, A.: Lexical URL analysis for discriminating phishing and legitimate websites. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 109–115 (2011)
14.
go back to reference Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: Proceedings - International Conference on Distributed Computing Systems 2016, vol. 2016–August, no. Sect. V, pp. 323–333 (2016) Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: Proceedings - International Conference on Distributed Computing Systems 2016, vol. 2016–August, no. Sect. V, pp. 323–333 (2016)
15.
go back to reference Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091–2121 (2013)CrossRef Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091–2121 (2013)CrossRef
16.
go back to reference Bergholz, A., Paaß, G., Reichartz, F., Strobel, S., Birlinghoven, S.: Improved phishing detection using model-based features. In: Fifth Conference on Email and Anti-spam, CEAS (2008) Bergholz, A., Paaß, G., Reichartz, F., Strobel, S., Birlinghoven, S.: Improved phishing detection using model-based features. In: Fifth Conference on Email and Anti-spam, CEAS (2008)
17.
go back to reference Khonji, M., Jones, A., Iraqi, Y.: A novel Phishing classification based on URL features. In: IEEE GCC Conference and Exhibition (GCC), pp. 221–224 (2011) Khonji, M., Jones, A., Iraqi, Y.: A novel Phishing classification based on URL features. In: IEEE GCC Conference and Exhibition (GCC), pp. 221–224 (2011)
18.
go back to reference Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 30 (2011) Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 30 (2011)
19.
go back to reference Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539–540 (2009)CrossRef Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539–540 (2009)CrossRef
20.
go back to reference Zhang, J., Wang, Y.: A real-time automatic detection of phishing URLs. In: 2nd International Conference on Computer Science and Network Technology (ICCSNT), pp. 1212–1216 (2012) Zhang, J., Wang, Y.: A real-time automatic detection of phishing URLs. In: 2nd International Conference on Computer Science and Network Technology (ICCSNT), pp. 1212–1216 (2012)
21.
go back to reference Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539–546 (2008)CrossRef Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539–546 (2008)CrossRef
22.
go back to reference Abdulhamid, S.M., et al.: A review on mobile SMS spam filtering techniques. IEEE Access 5, 15650–15666 (2017)CrossRef Abdulhamid, S.M., et al.: A review on mobile SMS spam filtering techniques. IEEE Access 5, 15650–15666 (2017)CrossRef
23.
go back to reference Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63–92 (2008)CrossRef Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63–92 (2008)CrossRef
24.
go back to reference Panigrahi, P.: A comparative study of supervised machine learning techniques for spam E-mail filtering. In: Proceedings - 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012, pp. 506–512 (2012) Panigrahi, P.: A comparative study of supervised machine learning techniques for spam E-mail filtering. In: Proceedings - 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012, pp. 506–512 (2012)
25.
go back to reference Abdulhamid, S.M., Shuaib, M., Osho, O.: Comparative analysis of classification algorithms for email spam detection. Int. J. Comput. Network Inf. Security 1, 60–67 (2018)CrossRef Abdulhamid, S.M., Shuaib, M., Osho, O.: Comparative analysis of classification algorithms for email spam detection. Int. J. Comput. Network Inf. Security 1, 60–67 (2018)CrossRef
26.
go back to reference Iqbal, M., Abid, M.M., Ahmad, M., Khurshid, F.: Study on the effectiveness of spam detection technologies. Int. J. Inf. Technol. Comput. Sci. 01, 11–21 (2016) Iqbal, M., Abid, M.M., Ahmad, M., Khurshid, F.: Study on the effectiveness of spam detection technologies. Int. J. Inf. Technol. Comput. Sci. 01, 11–21 (2016)
27.
go back to reference Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Associative classification techniques for predicting e-banking phishing websites. In: International Conference on Multimedia Computing and Information Technology (MCIT), pp. 9–12 (2010) Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Associative classification techniques for predicting e-banking phishing websites. In: International Conference on Multimedia Computing and Information Technology (MCIT), pp. 9–12 (2010)
28.
go back to reference Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Intelligent detection system for e-banking phishing websites using fuzzy data mining. Expert Syst. Appl. 37(12), 7913–7921 (2010)CrossRef Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Intelligent detection system for e-banking phishing websites using fuzzy data mining. Expert Syst. Appl. 37(12), 7913–7921 (2010)CrossRef
29.
go back to reference Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Predicting phishing websites using classification mining techniques with experimental case studies. In: Seventh International Conference on Information Technology: New Generations (ITNG), pp. 176–181 (2010) Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Predicting phishing websites using classification mining techniques with experimental case studies. In: Seventh International Conference on Information Technology: New Generations (ITNG), pp. 176–181 (2010)
30.
go back to reference Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245–1254 (2009) Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245–1254 (2009)
31.
go back to reference Basnet, R.B., Sung, A.H., Liu, Q.: Learning to detect phishing URLs. IJRET: Int. J. Res. Eng. Technol. 3(6), 11–24 (2014)CrossRef Basnet, R.B., Sung, A.H., Liu, Q.: Learning to detect phishing URLs. IJRET: Int. J. Res. Eng. Technol. 3(6), 11–24 (2014)CrossRef
32.
go back to reference Gupta, R.: Comparison of classification algorithms to detect phishing web pages using feature selection and extraction. Int. J. Res. Granthaalayah 4(8), 118–135 (2016) Gupta, R.: Comparison of classification algorithms to detect phishing web pages using feature selection and extraction. Int. J. Res. Granthaalayah 4(8), 118–135 (2016)
33.
go back to reference Nawafleh, S., Hadi, W.: Multi-class associative classification to predicting phishing websites. Int. J. Acad. Res. 4(6), 302–306 (2012)CrossRef Nawafleh, S., Hadi, W.: Multi-class associative classification to predicting phishing websites. Int. J. Acad. Res. 4(6), 302–306 (2012)CrossRef
34.
go back to reference Ali, W.: Phishing website detection based on supervised machine learning with wrapper features selection. Int. J. Adv. Comput. Sci. Appl. 8(9), 72–78 (2017) Ali, W.: Phishing website detection based on supervised machine learning with wrapper features selection. Int. J. Adv. Comput. Sci. Appl. 8(9), 72–78 (2017)
35.
go back to reference Oluyomi, A., Osho, O., Shuaib, M.: Evaluation of classification algorithms for phishing URL detection. In: 2nd International Conference on Information and Communication Technology and Its Applications, pp. 243–249 (2018) Oluyomi, A., Osho, O., Shuaib, M.: Evaluation of classification algorithms for phishing URL detection. In: 2nd International Conference on Information and Communication Technology and Its Applications, pp. 243–249 (2018)
Metadata
Title
Comparative Evaluation of Techniques for Detection of Phishing URLs
Authors
Oluwafemi Osho
Ayanfeoluwa Oluyomi
Sanjay Misra
Ravin Ahuja
Robertas Damasevicius
Rytis Maskeliunas
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-32475-9_28

Premium Partner