Detection of Phishing Websites by Using Machine Learning-Based URL Analysis

Abstract

In recent years, advancements in Internet and cloud technologies have led to a significant increase in electronic trading in which consumers make online purchases and transactions. This growth leads to unauthorized access to users’ sensitive information and damages the resources of an enterprise. Phishing is one of the familiar attacks that trick users to access malicious content and gain their information. In terms of website interface and uniform resource locator (URL), most phishing webpages look identical to the actual webpages. Various strategies for detecting phishing websites, such as blacklist, heuristic, Etc., have been suggested. However, due to inefficient security technologies, there is an exponential increase in the number of victims. The anonymous and uncontrollable framework of the Internet is more vulnerable to phishing attacks. Existing research works show that the performance of the phishing detection system is limited. There is a demand for an intelligent technique to protect users from the cyber-attacks. In this study, the author proposed a URL detection technique based on machine learning approaches. A recurrent neural network method is employed to detect phishing URL. Researcher evaluated the proposed method with 7900 malicious and 5800 legitimate sites, respectively. The experiments’ outcome shows that the proposed method’s performance is better than the recent approaches in malicious URL detection. In recent years, with the increasing use of mobile devices, there is a growing trend to move almost all real-world operations to the cyber world. Although this makes easy our daily lives, it also brings many security breaches due to the anonymous structure of the Internet. The experimental results depict that the proposed models have an outstanding performance with a success rate.

Country : India

1 Shamna Jabbin P2 Prof. P. Gopika

  1. PG Student, Dept. of Computer Science and Engineering, EASA College of Engineering and Technology, Tamilnadu, India
  2. Professor, Dept. of Computer Science and Engineering, EASA College of Engineering and Technology, Tamilnadu, India

IRJIET, Volume 8, Issue 2, February 2024 pp. 133-137

doi.org/10.47001/IRJIET/2024.802019

References

  1. State of Cybersecurity Implications for 2016. An ISACA and RSA Conference Survey.[Online]. Available https://cybersecurity.isaca.org/csx-resources/state-of- ybersecurityimplications-for-2016.[Accessed: 09-Mar-2020].
  2. Republic of Turkey, “National Cyber Security Strategy, 2016,” Ministry of Transport Martime Affairs and Communications.
  3. R. Loftus, “What cybersecurity trends should you look out for in 2020?,” Daily English Global blogkasperskycom. [Online]. Available: https://www.kaspersky.com/blog/secure-futures-magazine/2020- cyber security-predictions/32068/. [Accessed: 09-Mar-2020].
  4. E. Buber, Ö. Demir and O. K. Sahingoz, "Feature selections for the machine learning based detection of phishing websites," 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, 2017, pp. 1-5.
  5. “Retruster,” Retruster. [Online]. Available: https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html. [Accessed: 09-Mar-2020].
  6. “Phishing Activity Trends Reports, 1st-2nd-3rd Half” APWG. [Online]. Available: https://apwg.org/trendsreports/. [Accessed: 09-Mar-2020].
  7. Y. Cao, W. Han, and Y. Le, “Anti-phishing based on automated individual white-list,” Proceedings of the 4th ACM workshop on Digital identity management - DIM 08, pp. 51–60, 2008.
  8. M. Sharifi and S. H. Siadati, “A phishing sites blacklist generator,” 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp. 840–843, 2008.
  9. M. Khonji, Y. Iraqi, and A. Jones, “Phishing Detection: A Literature Survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2091–2121, 2013.
  10. Y. Zhang, J. I. Hong, and L. F. Cranor, “Cantina, a content based approach to detecting phishing web sites” Proceedings of the 16th international conference on World Wide Web - WWW 07, pp. 639-648, 2007.
  11. S Sugumaran, B Buvaneswari, KS Senthil Kumar "Optimization Based collision Avoidance in under water wireless sensor Network2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), pages 1-6, Publishers IEEE.
  12. D Nethra Pingala Suthishni, GP Ramesh Kumar intrusion detection analysis by implementing fuzzy logic, journal Int. J. Appl. Eng. Res volume 11, issue  5, page 3216-3220.
  13. Dr. E. CHANDRA BLESSIE, S.GNANAPRIYA "A REVIEW ON OPTIMIZATION FOR PRE-PROCESSING TECHNIQUES IN DATA MINING", The International journal of analytical and experimental modal analysis, ISSN NO: 0886-9367.