CFP last date
20 December 2024
Reseach Article

A Framework for Multi Features based Phishing Information Identification using NB and SVM Approach

by Jyoti S. Kharat, Snehal S. Shinde, Anjali P. Deore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 27
Year of Publication: 2018
Authors: Jyoti S. Kharat, Snehal S. Shinde, Anjali P. Deore
10.5120/ijca2018918088

Jyoti S. Kharat, Snehal S. Shinde, Anjali P. Deore . A Framework for Multi Features based Phishing Information Identification using NB and SVM Approach. International Journal of Computer Applications. 181, 27 ( Nov 2018), 31-36. DOI=10.5120/ijca2018918088

@article{ 10.5120/ijca2018918088,
author = { Jyoti S. Kharat, Snehal S. Shinde, Anjali P. Deore },
title = { A Framework for Multi Features based Phishing Information Identification using NB and SVM Approach },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2018 },
volume = { 181 },
number = { 27 },
month = { Nov },
year = { 2018 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number27/30110-2018918088/ },
doi = { 10.5120/ijca2018918088 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:55.824109+05:30
%A Jyoti S. Kharat
%A Snehal S. Shinde
%A Anjali P. Deore
%T A Framework for Multi Features based Phishing Information Identification using NB and SVM Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 27
%P 31-36
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Criminal organizations around the world use the technique known as phishing to extract information from innocent citizens in order to access their bank details, to steal identities, to launder money and more. There are Different types of statistical learning based classification methods are available to differentiate the phishing webpage’s from the original. Feature extraction method is the concept, which has been implementing into the development of web phishing information detection technique. Naïve Bayes and SVM statistical algorithms are used for feature extraction of URL and source code respectively. In contrast to other proposals, this scheme has a high detection rate and a low false negative rate as well as can achieve high detection accuracy, the lower detection time and performance with the small sample of a classification model training set.

References
  1. Haijun Zhang, Gang Liu, Tommy W. S. Chow, and Wenyin Liu, “Textual and Visual Content-Based Anti-Phishing: Bayesian Approach”, IEEE transactions on Neural networks, Vol. 22, No. 10, October 2011.
  2. Gaurav Mishra et. al, “AntiPhishing Techniques: A Review”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2,MarApr 2012, pp.350-355
  3. Binay Kumar, Pankaj Kumar, Ankit Mundra, Shikha Kabra,” DC Scanner: Detecting Phishing Attack”,2015 IEEE.
  4. Vimal Kumar and Rakesh kumar,”Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network”,2015 IEEE.
  5. Luong Anh Tuan Nguyen, Ba Lam To, Huu Khuong Nguyen and Minh Hoang Nguyen,” Novel Approach for Phishing Detection Using URL-Based Heuristic”
  6. M. Aburrous, M.A. Hossain, F. Thabatah, K. Dahal, “Intelligent phishing website detection system using fuzzy techniques”, Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, pp. 1 – 6, 7-11 April 2008.
  7. Hevia, A. ; Weber, R. ; Ríos, S., “Latent semantic analysis and keyword extraction for phishing classification”, Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on, pp. 129 – 131, 23-26 May 2010.
  8. Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang and Suku Nair, “A comparison of machine learning techniques for phishing detection”, anti-phishing working groups 2nd annual eCrime researchers summit, pp. 60-69, 2007.
  9. Sosa-Sosa, V.J. ; Lopez-Arevalo, I., “A strategy for identification of Web query interfaces using supervised learning”, Next Generation Web Services Practices (NWeSP), 2011 7th International Conference on, pp. 233 – 237, 19-21 Oct. 2011.
  10. Eric Medvet, Engin Kirda, Christopher Kruegel, “Visual-Similarity-Based Phishing Detection”, 4th international conference on Security and privacy in communication networks, Article No. 22, 2008.
  11. Dong Shou-bin ; Zheng Xiang ; Ma Bin-Hua, “Improving Navigation Page Detection by Using DOM-Based Block Text Identification”, ICT and Knowledge Engineering (ICT & Knowledge Engineering), 2012 10th International Conference on, pp. 129 – 134, 21-23 Nov. 2012.
  12. Sari, R.F. ; Budiardjo, B., “Implementing web data extraction and making Mashup with Xtractorz”, Advance Computing Conference (IACC), 2010 IEEE 2nd International, pp. 385 – 393, 19-20 Feb. 2010.
  13. Rattapoom Tuchinda, Pedro Szekely, and Craig A. Knoblock, “Building Mashup by Example”, 13th international conference on Intelligent user interfaces, pp. 139-148 ,2008.
  14. Suzhi Zhang, Peizhong Shi, “An Efficient Wrapper for Web Data Extraction and its Application”, Computer Science & Education, 2009. ICCSE '09. 4th International Conference on, pp. 1245 – 1250, 25-28 July 2009.
  15. Juan Raposo, Alberto Pan, Manuel Alvarez, Justo Hidalgo, “Automatically maintaining wrappers for semi-structured web sources[J]”, Data & Knowledge Engineering.,Vol 61: pp.331-358,2007.
  16. Jingqi Wang, Qingcai Chen, Xiaolong Wang, “Basic Semantic Units Based Web Page Content Extraction”, Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on, pp. 1489 – 1494, 12-15 Oct. 2008.
  17. Ram Basnet, Srinivas Mukkamala, Andrew H. Sung, “Detection of Phishing Attacks: A Machine Learning Approach”, Book Title-Soft Computing Applications in Industry, Vol 226 pp. 373-383,2008.
  18. Mrs.G.Subbalakshmi, Mr. K. Ramesh, Mr. M. Chinna Rao, “Decision Support in Heart Disease Prediction System using Naive Bayes”, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2 No. 2 Apr-May 2011.
  19. PhishtankInc,phishingdateset, http://www.phishtank.com/.
Index Terms

Computer Science
Information Sciences

Keywords

SVM Phisher Naïve Bayes Multi features