







Vol.4 , No. 4, Publication Date: Sep. 26, 2017, Page: 31-35
[1] | Asma Al Sarhan, Computers Sciences Department, KASIT, University of Jordan, Amman, Jordan. |
[2] | Riad Jabri, Computers Sciences Department, KASIT, University of Jordan, Amman, Jordan. |
[3] | Ahmad Sharieh, Computers Sciences Department, KASIT, University of Jordan, Amman, Jordan. |
Phishing is stealing users' confidential information by uploading a fake website that claims to be of another. Such a web site contains special features that aid an automatic classification of it as phishing one. However, there is no single feature that to be used to identify the phishing web-sites. Subsequently, the properties of phishing website are defined as a collection of features and then used to actively discover such sites in real-time. This research develops automatic classification of a web-site into a phishing or non-phishing one based on aggregation of a set of predetermined features related to the content of the site. A classifier is developed based on Ant-Colony optimization, known as cAnt-MinerPB. The features are combined and listed in a tree structure using document object model (DOM) representation to find the best level of detailed features that helps in capturing the phishing properties. Moreover, such hierarchical representation is used to capture strength and weakness of the classifier itself and other classifiers that are used for a comparative study. The proposed method has a fair accuracy as compared to well-known algorithms. For the tested data set, its obtained accuracy was close to that obtained by KNN and SVM. The proposed classier, for the conducted experiments, is better than other classifiers that are rule based. The cAnt-MinerPB has shown promising results compared to the well-known and well-established classification techniques.
Keywords
DOM-Tree Structure, cAnt-MinerPB Algorithm, Phishing Detection
Reference
[01] | Khonji, M., Y. Iraqi, et al. (2013). Phishing Detection: a Literature Survey. Communications Surveys & Tutorials, IEEE 15 (4), 2091-2121. |
[02] | Anti-Phishing Working G. (2004). Phishing Activity Trends Report, Anti-Phishing Working Group. |
[03] | Pan, Y. and X. Ding (2006). Anomaly Based Web Phishing Page Detection. In Computer Security Applications Conference, 2006, ACSAC'06. 22nd Annual, IEEE. |
[04] | Aburrous, M., M. A. Hossain, et al. (2010). Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining, Expert Systems with Applications, 37 (12), 7913-7921. |
[05] | Chandrasekaran, M., K. Narayanan, et al. (2006). Phishing Email Detection Based on Structural Properties. In NYS Cyber Security Conference, U.S.A, Buffalo, NY-14260. |
[06] | Zhang, N. and Y. Yuan (2013). Phishing Detection Using Neural Network. CS229 lecture notes. http://cs229.stanford.edu/proj2012/ZhangYuan |
[07] | Riaty, S, Sharieh, A., Jabri, R., Al Bdour, H.(2017). Enhance Detecting Phishing Websites Based on Machine Learning Techniques of Fuzzy Logic with Associative Rules, Kasmera Journal, Vol. 45 (1), pp 63-75. |
[08] | Otero, F. E. B., A. Freitas, et al. (2013). A New Sequential Covering Strategy for Inducing Classification Rules with An Colony Algorithms. Evolutionary Computation, IEEE. |
[09] | Al Sarhan, A., Jabri, R. (2016). Security Phishing Detection using DOM-Tree Structure and cAnt-MinerPB Algorithm, University Of Jordan, Thesis, Master in Computer Science. |
[10] | Mohammad, R. M., F. Thabtah, et al. (2012). An Assessment of Features Related to Phishing Websites Using an Automated Technique. In International Conference for Internet Technology and Secured Transactions, IEEE: 492-497. |
[11] | Mohammad, R. M., F. Thabtah, et al. (2014). Intelligent Rule-Based Phishing Websites Classification. Information Security, IET8 (3): 153-160. |