Hybrid Client Side Phishing Websites Detection Approach
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 7
Abstract
Phishing tricks to steal personal or credential information by entering victims into a forged website similar to the original site, and urging them to enter their information believing that this site is legitimate. The number of internet users who are becoming victims of phishing attacks is increasing beside that phishing attacks have become more sophisticated. In this paper we propose a client-side solution to protect against phishing attacks which is a Firefox extension integrated as a toolbar that is responsible for checking whether recipient website is trusted or not by inspecting URLs of each requested webpage. If the site is suspicious the toolbar is going to block it. Every URL is evaluated corresponding to features extracted from it. Three heuristics (primary domain, sub domain, and path) and Naïve Bayes classification using four lexical features combined with page ranking received from two different services (Alexa, and Google page rank) used to classify URL. The proposed method requires no server changes and will prevent internet users from fraudulent sites especially from phishing attacks based on deceptive URLs. Experimental results show that our approach can achieve 48% accuracy ratio using a test set of 246 URL, and 87.5% accuracy ratio by excluding NB addition tested over 162 URL.
Authors and Affiliations
Firdous Kausar, Bushra Al-Otaibi, Asma Al-Qadi, Nwayer Al-Dossari
Embed Attitude from Student on Elearning Using Instructional Design with ADDIE Model
Attitude is very important in an education, without a good attitude certainly education will not be able to run smoothly, even education can be said to fail if the output of the education did not have a good attitude in...
Customers Churn Prediction using Artificial Neural Networks (ANN) in Telecom Industry
To survive in the fierce competition of telecommunication industry and to retain the existing loyal customers, prediction of potential churn customer has become a crucial task for practitioners and academicians through p...
Dominating Sets and Spanning Tree based Clustering Algorithms for Mobile Ad hoc Networks
The infrastructure less and dynamic nature of mobile ad hoc networks (MANET) needs efficient clustering algorithms to improve network management and to design hierarchical routing protocols. Clustering algorithms in mob...
Mutual Exclusion Principle for Multithreaded Web Crawlers
This paper describes mutual exclusion principle for multithreaded web crawlers. The existing web crawlers use data structures to hold frontier set in local address space. This space could be used to run more crawler thre...
Transfer Learning Method Using Ontology for Heterogeneous Multi-agent Reinforcement Learning
This paper presents a framework, called the knowledge co-creation framework (KCF), for heterogeneous multiagent robot systems that use a transfer learning method. A multiagent robot system (MARS) that utilizes reinforcem...