Skip to main content

2018 | OriginalPaper | Buchkapitel

Phishing Detection Research Based on PSO-BP Neural Network

verfasst von : Wenwu Chen, Xu An Wang, Wei Zhang, Chunfen Xu

Erschienen in: Advances in Internet, Data & Web Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to effectively detect phishing attacks, this paper proposes a method of combining Particle Swarm Optimization with BP neural network to build a new phishing website detection system. PSO optimizes neural network parameters to improve the convergence performance of neural network detection model. Experimental results show that this algorithm can improve the prediction speed and the accuracy of detecting phishing websites by 3.7% compared with the conventional BP neural network algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Phishing Activity Trends Report 1st Half. Methodology (2017) Phishing Activity Trends Report 1st Half. Methodology (2017)
3.
Zurück zum Zitat Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based “blacklists”. In: International Conference on Malicious and Unwanted Software, pp. 57–64. IEEE (2008) Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based “blacklists”. In: International Conference on Malicious and Unwanted Software, pp. 57–64. IEEE (2008)
4.
Zurück zum Zitat Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, DBLP, pp. 639–648, May 2007 Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, DBLP, pp. 639–648, May 2007
5.
Zurück zum Zitat Xiang, G., Hong, J., Rose, C.P., et al.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)CrossRef Xiang, G., Hong, J., Rose, C.P., et al.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)CrossRef
6.
Zurück zum Zitat Wenyin, L., Huang, G., Xiaoyue, L., et al.: Detection of phishing webpages based on visual similarity. In: Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 1060–1061 (2005) Wenyin, L., Huang, G., Xiaoyue, L., et al.: Detection of phishing webpages based on visual similarity. In: Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 1060–1061 (2005)
7.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009, DBLP, pp. 1245–1254 (2009) Ma, J., Saul, L.K., Savage, S., et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009, DBLP, pp. 1245–1254 (2009)
8.
Zurück zum Zitat Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Usenix Conference on Web Application Development, p. 11 (2011) Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Usenix Conference on Web Application Development, p. 11 (2011)
9.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., et al.: Identifying suspicious URLs: an application of large-scale online learning. In: International Conference on Machine Learning, pp. 681–688. ACM (2009) Ma, J., Saul, L.K., Savage, S., et al.: Identifying suspicious URLs: an application of large-scale online learning. In: International Conference on Machine Learning, pp. 681–688. ACM (2009)
10.
Zurück zum Zitat Sadeghi, B.H.M.: A BP-neural network predictor model for plastic injection molding process. J. Mater. Process. Technol. 103(3), 411–416 (2000)CrossRef Sadeghi, B.H.M.: A BP-neural network predictor model for plastic injection molding process. J. Mater. Process. Technol. 103(3), 411–416 (2000)CrossRef
11.
Zurück zum Zitat Kennedy, J., Eberhart, R.: Particle Swarm Optimization. Springer, US (2011) Kennedy, J., Eberhart, R.: Particle Swarm Optimization. Springer, US (2011)
12.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., et al.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3), 1–24 (2011) Ma, J., Saul, L.K., Savage, S., et al.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3), 1–24 (2011)
13.
Zurück zum Zitat Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey (2017) Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey (2017)
14.
Zurück zum Zitat Lakshmi, V.S., Vijaya, M.S.: Efficient prediction of phishing websites using supervised learning algorithms. Procedia Eng. 30(9), 798–805 (2012)CrossRef Lakshmi, V.S., Vijaya, M.S.: Efficient prediction of phishing websites using supervised learning algorithms. Procedia Eng. 30(9), 798–805 (2012)CrossRef
15.
Zurück zum Zitat Marchal, S., Francois, J., State, R., et al.: PhishScore: hacking phishers’ minds. IEEE (2014) Marchal, S., Francois, J., State, R., et al.: PhishScore: hacking phishers’ minds. IEEE (2014)
16.
Zurück zum Zitat Chang, J.H., Lee, K.H.: Voice phishing detection technique based on minimum classification error method incorporating codec parameters. IET Sig. Process. 4(5), 502–509 (2010)CrossRef Chang, J.H., Lee, K.H.: Voice phishing detection technique based on minimum classification error method incorporating codec parameters. IET Sig. Process. 4(5), 502–509 (2010)CrossRef
17.
Zurück zum Zitat Chang, J., Venkatasubramanian, K.K., West, A.G., et al.: Analyzing and defending against web-based malware. ACM Comput. Surv. 45(4), 49 (2013)CrossRef Chang, J., Venkatasubramanian, K.K., West, A.G., et al.: Analyzing and defending against web-based malware. ACM Comput. Surv. 45(4), 49 (2013)CrossRef
18.
Zurück zum Zitat Rao, R.S., Ali, S.T.: PhishShield: a desktop application to detect phishing webpages through heuristic approach. Procedia Comput. Sci. 54, 147–156 (2015)CrossRef Rao, R.S., Ali, S.T.: PhishShield: a desktop application to detect phishing webpages through heuristic approach. Procedia Comput. Sci. 54, 147–156 (2015)CrossRef
19.
Zurück zum Zitat Shekokar, N.M., Shah, C., Mahajan, M., et al.: An ideal approach for detection and prevention of phishing attacks. Procedia Comput. Sci. 49, 82–91 (2015)CrossRef Shekokar, N.M., Shah, C., Mahajan, M., et al.: An ideal approach for detection and prevention of phishing attacks. Procedia Comput. Sci. 49, 82–91 (2015)CrossRef
20.
Zurück zum Zitat Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur. 2016(1), 9 (2016)CrossRef Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur. 2016(1), 9 (2016)CrossRef
21.
Zurück zum Zitat Kim, D., Achan, C., Baek, J., et al.: Implementation of framework to identify potential phishing websites, p. 268. IEEE (2013) Kim, D., Achan, C., Baek, J., et al.: Implementation of framework to identify potential phishing websites, p. 268. IEEE (2013)
22.
Zurück zum Zitat Garera, S., Provos, N., Chew, M., et al.: A framework for detection and measurement of phishing attacks. In: ACM Workshop on Recurring Malcode, pp. 1–8. ACM (2007) Garera, S., Provos, N., Chew, M., et al.: A framework for detection and measurement of phishing attacks. In: ACM Workshop on Recurring Malcode, pp. 1–8. ACM (2007)
23.
Zurück zum Zitat Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. 13(12), 4841–4848 (2013)CrossRef Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. 13(12), 4841–4848 (2013)CrossRef
24.
Zurück zum Zitat Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 1–36 (2008)CrossRef Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8(4), 1–36 (2008)CrossRef
25.
Zurück zum Zitat Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: 2006 Computer Security Applications Conference, ACSAC 2006, pp. 381–392. IEEE (2006) Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: 2006 Computer Security Applications Conference, ACSAC 2006, pp. 381–392. IEEE (2006)
26.
Zurück zum Zitat Fu, A.Y., Liu, W., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301–311 (2006)CrossRef Fu, A.Y., Liu, W., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover’s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301–311 (2006)CrossRef
Metadaten
Titel
Phishing Detection Research Based on PSO-BP Neural Network
verfasst von
Wenwu Chen
Xu An Wang
Wei Zhang
Chunfen Xu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75928-9_91