Skip to main content

2019 | OriginalPaper | Buchkapitel

Webpages Classification with Phishing Content Using Naive Bayes Algorithm

verfasst von : Jorge Enrique Rodríguez Rodríguez, Víctor Hugo Medina García, Nelson Pérez Castillo

Erschienen in: Knowledge Management in Organizations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Phishing attacks cause people to be scammed and cheated because of the impossibility to visually detect fraudulent websites. As is known, the attack occurs from emails sent to collect or update information supposedly from an entity, there are also cases of phone calls or instant messages. There is ignorance of such attacks by people in general, which means that the user is not alerted, which means that he is not attentive to the digital certificates present on the page that authenticate the content of the same. For this reason, the web pages designed have required tools that counteract and alert the user of the “phished” webpages, which commit the theft of money from the account from which information has been provided.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baykara, M., Grürel, Z.: Detection of phishing attacks. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya (2018) Baykara, M., Grürel, Z.: Detection of phishing attacks. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya (2018)
2.
Zurück zum Zitat Karabatak, M., Mustafa, T.: Performance comparation of classifiers on reduced phishing website dataset. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya (2018) Karabatak, M., Mustafa, T.: Performance comparation of classifiers on reduced phishing website dataset. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya (2018)
3.
Zurück zum Zitat Fadheel, W., Abusharkh, M., Abdel-Qader, I.: On Feature selection for the prediction of phishing websites. In: 15th International Conference on Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence and Computing, Orlando (2017) Fadheel, W., Abusharkh, M., Abdel-Qader, I.: On Feature selection for the prediction of phishing websites. In: 15th International Conference on Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence and Computing, Orlando (2017)
4.
Zurück zum Zitat Shaikh, A., Shabut, A., Hossain, M.: A literature review on phishing crime, prevention review and investigation of gaps. In: 10th International Conference on Software, Knowledge, Information Management and Applications, Chengdu (2016) Shaikh, A., Shabut, A., Hossain, M.: A literature review on phishing crime, prevention review and investigation of gaps. In: 10th International Conference on Software, Knowledge, Information Management and Applications, Chengdu (2016)
5.
Zurück zum Zitat Gaonkar, M.N., Sawant, K.: AutoEpsDBSCAN: DBSCAN with Eps automatic for large dataset. Int. J. Adv. Comput. Theor. Eng. 2319–2526 (2013) Gaonkar, M.N., Sawant, K.: AutoEpsDBSCAN: DBSCAN with Eps automatic for large dataset. Int. J. Adv. Comput. Theor. Eng. 2319–2526 (2013)
6.
Zurück zum Zitat Ester, M.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, Oregon (1996) Ester, M.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, Oregon (1996)
7.
Zurück zum Zitat Gupta, B., Nalin, A., Psannis, K.: Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun. Syst. Model. Anal. Des. Manag. 67, 247–267 (2018)CrossRef Gupta, B., Nalin, A., Psannis, K.: Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun. Syst. Model. Anal. Des. Manag. 67, 247–267 (2018)CrossRef
8.
Zurück zum Zitat Gupta, B., Tewari, A., Jain, A., Agrawal, D.: Fighting against phishing attacks: state of the art and future challenges. Nat. Comput. Appl. Forum 1–26 (2016) Gupta, B., Tewari, A., Jain, A., Agrawal, D.: Fighting against phishing attacks: state of the art and future challenges. Nat. Comput. Appl. Forum 1–26 (2016)
9.
Zurück zum Zitat Abbasi, A., Zahedi, F.M., Chen, Y.: Impact of anti-phishing tool performance on attack success rates. In: 10th IEEE International Conference on Intelligence and Security Informatics (ISI), Washington (2012) Abbasi, A., Zahedi, F.M., Chen, Y.: Impact of anti-phishing tool performance on attack success rates. In: 10th IEEE International Conference on Intelligence and Security Informatics (ISI), Washington (2012)
10.
Zurück zum Zitat Mockford, A.: An exploratory descriptive study of the needs of parents after their young child is discharged from hospital following an admission with an acute illness, Victoria University of Wellington, Wellington (2008) Mockford, A.: An exploratory descriptive study of the needs of parents after their young child is discharged from hospital following an admission with an acute illness, Victoria University of Wellington, Wellington (2008)
11.
Zurück zum Zitat Rogalewicz, M., Sika, R.: Methodologies of knowledge discovery from data and data mining methods in mechanical engineering. Manag. Prod. Eng. Rev. 7(4), 97–108 (2016)CrossRef Rogalewicz, M., Sika, R.: Methodologies of knowledge discovery from data and data mining methods in mechanical engineering. Manag. Prod. Eng. Rev. 7(4), 97–108 (2016)CrossRef
12.
Zurück zum Zitat Hurwitz, J., Kirsch, D.: Machine Learning for Dummies. Wiley, New York (2018) Hurwitz, J., Kirsch, D.: Machine Learning for Dummies. Wiley, New York (2018)
13.
Zurück zum Zitat Berthold, M., Hand, D.: Intelligence Data Analysis - An Introduction. Springer, New York (2002)MATH Berthold, M., Hand, D.: Intelligence Data Analysis - An Introduction. Springer, New York (2002)MATH
14.
Zurück zum Zitat Mesa, O. Rivera, M., Romero, J.: Descripción general de la Inferencia Bayesiana y sus aplicaciones en los procesos de gestión, La simulación al servicio de la academia, vol. 2, pp. 1–3 (2011) Mesa, O. Rivera, M., Romero, J.: Descripción general de la Inferencia Bayesiana y sus aplicaciones en los procesos de gestión, La simulación al servicio de la academia, vol. 2, pp. 1–3 (2011)
15.
Zurück zum Zitat Mitchell, T.: Machine Learning. McGraw-Hill, United States of America (1997)MATH Mitchell, T.: Machine Learning. McGraw-Hill, United States of America (1997)MATH
16.
Zurück zum Zitat Chai, K., Hn, H.T., Chieu, H.L.: Bayesian online classifiers for text classification and filtering. In: 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tampere (2002) Chai, K., Hn, H.T., Chieu, H.L.: Bayesian online classifiers for text classification and filtering. In: 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tampere (2002)
17.
Zurück zum Zitat Witten, I., Eibe, F.: Data Mining: Practical Machine Learning Tools and Techniques with Java Impletations. Morgan Kaufmann, San Diego (2000)MATH Witten, I., Eibe, F.: Data Mining: Practical Machine Learning Tools and Techniques with Java Impletations. Morgan Kaufmann, San Diego (2000)MATH
18.
Zurück zum Zitat Hellerstein, J., Thathachar, J., Rish, I.: Recognizing end-user transactions in performance menagement. In: Proceedings of AAAI-2000, pp. 596–602 (2000) Hellerstein, J., Thathachar, J., Rish, I.: Recognizing end-user transactions in performance menagement. In: Proceedings of AAAI-2000, pp. 596–602 (2000)
20.
Zurück zum Zitat Taheri, S., Mammadov, M.: Learning The Naive Bayes Classifier With Optimization Models. Int. J. Appl. Math. Comput. Sci. (2013) Taheri, S., Mammadov, M.: Learning The Naive Bayes Classifier With Optimization Models. Int. J. Appl. Math. Comput. Sci. (2013)
21.
Zurück zum Zitat Hernández Orallo, J., Ramírez Quintana, M., Ferri Ramírez, C.: Introducción a la minería de datos, Pearson (2004) Hernández Orallo, J., Ramírez Quintana, M., Ferri Ramírez, C.: Introducción a la minería de datos, Pearson (2004)
22.
Zurück zum Zitat Guyon, I., Elissee, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)MATH Guyon, I., Elissee, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)MATH
23.
Zurück zum Zitat Rodriguez, J.E., Medina, V.H., Ospina, M.A.: Corporate networks traffic analysis for knowledge management based on random interactions clustering algorithm. J. Commun. Comput. Inf. Sci. 877(1), 523–536 (2018) Rodriguez, J.E., Medina, V.H., Ospina, M.A.: Corporate networks traffic analysis for knowledge management based on random interactions clustering algorithm. J. Commun. Comput. Inf. Sci. 877(1), 523–536 (2018)
24.
Zurück zum Zitat Shah, G.: An improved DBSCAN, a density based clustering algorithm with parameter selection for high dimensional datasets. In: Nirma University International Conference on Engineering, Gujarat (2012) Shah, G.: An improved DBSCAN, a density based clustering algorithm with parameter selection for high dimensional datasets. In: Nirma University International Conference on Engineering, Gujarat (2012)
25.
Zurück zum Zitat John, G., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338–345. Morgan Kaufmann Publisher (1995) John, G., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338–345. Morgan Kaufmann Publisher (1995)
Metadaten
Titel
Webpages Classification with Phishing Content Using Naive Bayes Algorithm
verfasst von
Jorge Enrique Rodríguez Rodríguez
Víctor Hugo Medina García
Nelson Pérez Castillo
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-21451-7_21