Skip to main content

2019 | OriginalPaper | Buchkapitel

Hybrid Rule-Based Model for Phishing URLs Detection

verfasst von : Kayode S. Adewole, Abimbola G. Akintola, Shakirat A. Salihu, Nasir Faruk, Rasheed G. Jimoh

Erschienen in: Emerging Technologies in Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing attack has been considered as a major security challenge facing online community due to the different sophisticated strategies that is being deployed by attackers. One of the reasons for creating phishing website by attackers is to employ social engineering technique that steal sensitive information from legitimate users, such as the user’s account details. Therefore, detecting phishing website has become an important task worthy of investigation. The most widely used blacklist-based approach has proven inefficient. Although, different models have been proposed in the literature by deploying a number of intelligent-based algorithms, however, considering hybrid intelligent approach based on rule induction for phishing website detection is still an open research issue. In this paper, a hybrid rule induction algorithm capable of separating phishing websites from genuine ones is proposed. The proposed hybrid algorithm leverages the strengths of both JRip and Projective Adaptive Resonance Theory (PART) algorithm to generate rule sets. Based on the experiments conducted on two publicly available datasets for phishing detection, the proposed algorithm demonstrates promising results achieving accuracy of 0.9453 and 0.9908 respectively on the two datasets. These results outperformed the results obtained with JRip and PART. Therefore, the rules generated from the hybrid algorithm are capable of identifying phishing links in real-time with reduction in false alarm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdelhamid, N., Ayesh, A., Thabtah, F.: Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)CrossRef Abdelhamid, N., Ayesh, A., Thabtah, F.: Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)CrossRef
2.
Zurück zum Zitat Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM (2006) Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM (2006)
3.
Zurück zum Zitat He, Q., Ma, X.: A large-scale URL filtering algorithm in high-speed flow. In: Proceedings of 2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 (2017) He, Q., Ma, X.: A large-scale URL filtering algorithm in high-speed flow. In: Proceedings of 2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 (2017)
5.
Zurück zum Zitat Jayakanthan, N., Ramani, A.V., Ravichandran, M.: Two phase classification model to detect malicious URLs. Int. J. Appl. Eng. Res. 12(9), 1893–1898 (2017) Jayakanthan, N., Ramani, A.V., Ravichandran, M.: Two phase classification model to detect malicious URLs. Int. J. Appl. Eng. Res. 12(9), 1893–1898 (2017)
6.
Zurück zum Zitat Vanhoenshoven, F., et al.: Detecting malicious URLs using machine learning techniques. In: 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016 (2017) Vanhoenshoven, F., et al.: Detecting malicious URLs using machine learning techniques. In: 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016 (2017)
7.
Zurück zum Zitat Gupta, S.: Efficient malicious domain detection using word segmentation and BM pattern matching. In: 2016 International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2016 (2017) Gupta, S.: Efficient malicious domain detection using word segmentation and BM pattern matching. In: 2016 International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2016 (2017)
8.
Zurück zum Zitat Thakur, S., Meenakshi, E., Priya, A.: Detection of malicious URLs in big data using RIPPER algorithm. In: Proceedings of RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (2018) Thakur, S., Meenakshi, E., Priya, A.: Detection of malicious URLs in big data using RIPPER algorithm. In: Proceedings of RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (2018)
9.
Zurück zum Zitat Liu, J., et al.: A Markov detection tree-based centralized scheme to automatically identify malicious webpages on cloud platforms. IEEE Access 6, 74025–74038 (2018)CrossRef Liu, J., et al.: A Markov detection tree-based centralized scheme to automatically identify malicious webpages on cloud platforms. IEEE Access 6, 74025–74038 (2018)CrossRef
10.
Zurück zum Zitat Vijayarani, S., Divya, M.: An efficient algorithm for generating classification rules. Int. J. Comput. Sci. Technol. 2(4), 512–515 (2011) Vijayarani, S., Divya, M.: An efficient algorithm for generating classification rules. Int. J. Comput. Sci. Technol. 2(4), 512–515 (2011)
12.
Zurück zum Zitat Lee, S., Kim, J.: Warning bird: a near real-time detection system for suspicious URLs in Twitter stream. IEEE Trans. Dependable Secur. Comput. 10(3), 183–195 (2013)CrossRef Lee, S., Kim, J.: Warning bird: a near real-time detection system for suspicious URLs in Twitter stream. IEEE Trans. Dependable Secur. Comput. 10(3), 183–195 (2013)CrossRef
13.
Zurück zum Zitat Adewole, K.S., et al.: SMSAD: a framework for spam message and spam account detection. Multimedia Tools Appl. 78, 3925–3960 (2017)CrossRef Adewole, K.S., et al.: SMSAD: a framework for spam message and spam account detection. Multimedia Tools Appl. 78, 3925–3960 (2017)CrossRef
14.
Zurück zum Zitat Adewole, K.S., et al.: Twitter spam account detection based on clustering and classification methods. J. Supercomput. 1–36 (2018) Adewole, K.S., et al.: Twitter spam account detection based on clustering and classification methods. J. Supercomput. 1–36 (2018)
15.
Zurück zum Zitat Bhardwaj, T., Sharma, T.K., Pandit, M.R.: Social engineering prevention by detecting malicious URLs using artificial bee colony algorithm. In: Pant, M., Deep, K., Nagar, A., Bansal, J.C. (eds.) Proceedings of the Third International Conference on Soft Computing for Problem Solving. AISC, vol. 258, pp. 355–363. Springer, New Delhi (2014). https://doi.org/10.1007/978-81-322-1771-8_31CrossRef Bhardwaj, T., Sharma, T.K., Pandit, M.R.: Social engineering prevention by detecting malicious URLs using artificial bee colony algorithm. In: Pant, M., Deep, K., Nagar, A., Bansal, J.C. (eds.) Proceedings of the Third International Conference on Soft Computing for Problem Solving. AISC, vol. 258, pp. 355–363. Springer, New Delhi (2014). https://​doi.​org/​10.​1007/​978-81-322-1771-8_​31CrossRef
16.
Zurück zum Zitat Darling, M., et al.: A lexical approach for classifying malicious URLs. In: Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 (2015) Darling, M., et al.: A lexical approach for classifying malicious URLs. In: Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 (2015)
17.
Zurück zum Zitat Xuan, J., Yongzhen, L.: The Detection method for two-dimensional barcode malicious urls based on the hash function. In: Proceedings of 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016 (2016) Xuan, J., Yongzhen, L.: The Detection method for two-dimensional barcode malicious urls based on the hash function. In: Proceedings of 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016 (2016)
18.
Zurück zum Zitat Dewan, P., Kumaraguru, P.: Facebook Inspector (FbI): Towards automatic real-time detection of malicious content on Facebook. Soc. Netw. Anal. Min. 7(1), 15 (2017)CrossRef Dewan, P., Kumaraguru, P.: Facebook Inspector (FbI): Towards automatic real-time detection of malicious content on Facebook. Soc. Netw. Anal. Min. 7(1), 15 (2017)CrossRef
19.
Zurück zum Zitat Mohammad, R.M., Thabtah, F., McCluskey, L.: An assessment of features related to phishing websites using an automated technique. In: 2012 International Conference for Internet Technology and Secured Transactions. IEEE (2012) Mohammad, R.M., Thabtah, F., McCluskey, L.: An assessment of features related to phishing websites using an automated technique. In: 2012 International Conference for Internet Technology and Secured Transactions. IEEE (2012)
20.
Zurück zum Zitat Veeralakshmi, V., Ramyachitra, D.: Ripple Down Rule learner (RIDOR) classifier for IRIS dataset. IJCSE 1(1), 79–85 (2015) Veeralakshmi, V., Ramyachitra, D.: Ripple Down Rule learner (RIDOR) classifier for IRIS dataset. IJCSE 1(1), 79–85 (2015)
21.
Zurück zum Zitat Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning (1995) Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning (1995)
22.
Zurück zum Zitat Ali, S., Smith, K.A.: On learning algorithm selection for classification. Appl. Soft Comput. 6(2), 119–138 (2006)CrossRef Ali, S., Smith, K.A.: On learning algorithm selection for classification. Appl. Soft Comput. 6(2), 119–138 (2006)CrossRef
23.
Zurück zum Zitat Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization (1998) Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization (1998)
Metadaten
Titel
Hybrid Rule-Based Model for Phishing URLs Detection
verfasst von
Kayode S. Adewole
Abimbola G. Akintola
Shakirat A. Salihu
Nasir Faruk
Rasheed G. Jimoh
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23943-5_9

Premium Partner