2020
DOI: 10.1109/access.2020.2969780
|View full text |Cite
|
Sign up to set email alerts
|

An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs

Abstract: We perform an in-depth, systematic benchmarking study and evaluation of phishing features on diverse and extensive datasets. We propose a new taxonomy of features based on the interpretation and purpose of each feature. Next, we propose a benchmarking framework called 'PhishBench,' which enables us to evaluate and compare the existing features for phishing detection systematically and thoroughly under identical experimental conditions, i.e., unified system specification, datasets, classifiers, and evaluation m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
70
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 84 publications
(72 citation statements)
references
References 40 publications
(66 reference statements)
2
70
0
Order By: Relevance
“…In applications in which there is a computational bottleneck, the second approach may be preferable, with possible changes in the adversary's behaviour incorporated via retraining. This tension between the need to robustify algorithms against attacks (training phase, Section 5) and the fast adaptivity of attackers against defences (operational phase, Section 4) is well exemplified in the phishing detection domain as discussed in [2].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In applications in which there is a computational bottleneck, the second approach may be preferable, with possible changes in the adversary's behaviour incorporated via retraining. This tension between the need to robustify algorithms against attacks (training phase, Section 5) and the fast adaptivity of attackers against defences (operational phase, Section 4) is well exemplified in the phishing detection domain as discussed in [2].…”
Section: Discussionmentioning
confidence: 99%
“…Classification is a major research area with important applications in security and cybersecurity, including fraud detection [1]: phishing detection [2], terrorism [3] or cargo screening [4]. An increasing number of processes are being automated through classification algorithms; it is essential that these are robust to trust key operations based on their output.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in El Aassal et al [ 22 ] proposed a benchmarking structure called PhishBench, which enables us to assess and analyze the existing features for phishing detection and completely understand indistinguishable test conditions, i.e., unified framework specification, datasets, classifiers, and performance measurements. The examinations indicated that the classification execution dropped when the proportion among phishing and authentic decreases towards 1 to 10.…”
Section: Literature Surveymentioning
confidence: 99%
“…Company representation fraud (aka job scam) attacks have increased in recent years [12,46,47]. Moreover, phishing detectors are not able to catch these frauds without retraining [1]. To gain an understanding of the parameters contributing to deception and action by the victim, we conduct a between-subjects study in which we take a well-known attack, viz., job scam, and parameterize it with signals such as surrounding context (facade) and customized content.…”
Section: Introductionmentioning
confidence: 99%