2018
DOI: 10.1007/s00521-017-3305-0
|View full text |Cite
|
Sign up to set email alerts
|

Detection of phishing websites using an efficient feature-based machine learning framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
86
1
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 167 publications
(97 citation statements)
references
References 41 publications
0
86
1
5
Order By: Relevance
“…This findings clearly show that, the arms race between anti phishers and scammers is continuing and the techniques of scammers are evolving to evade phishing detection mechanisms. Rao and Pais [3] have grouped these mechanisms into 4 technical categories: (1) list based, (2) heuristics based, (3) visual similarity based and (4) machine learning based methods. Each of these methods have different pros and cons.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This findings clearly show that, the arms race between anti phishers and scammers is continuing and the techniques of scammers are evolving to evade phishing detection mechanisms. Rao and Pais [3] have grouped these mechanisms into 4 technical categories: (1) list based, (2) heuristics based, (3) visual similarity based and (4) machine learning based methods. Each of these methods have different pros and cons.…”
Section: Introductionmentioning
confidence: 99%
“…According [4], list based attempts rely on gathering phished (black) or clean (white) URLs from various sources to provide a built-in protection mechanism often used in browsers such as Google Safe Browsing API. As [3] states, list based approaches [5] are very sensitive to URL modifications and vulnerable to zero-day phishing attacks. Likewise, Zhang et al [6] addressed the limitations of whitelist based approaches by stating "as the whitelist approach is based on similarity search instead of exact matching, its detection speed is greatly affected by the feature library size and searching strategy".…”
Section: Introductionmentioning
confidence: 99%
“…mentioned in the paper [80] [100], [112]- [114], [120]- [123], [156] [96], [132], [135], [141], [157], [158] [106], [144], [150], [152], [155] Naïve Bayes 12 [93], [101], [112], [141], [154], [156] [106], [118], [136], [148]- [150] Logistic Regression 14 [93], [96], [101], [112], [141], [150], [154]- [156] [106], [118], [120], [127], [129] Random Tree 2 [93], [151] Random Forest 7 [93], [101], [102], [106], [120], [148], [150] Decision Tree 14 [93], [101], [105],…”
Section: ] Precisionmentioning
confidence: 99%
“…Misspelled/Bad domain name 8 U [36], [42], [43], [56], [69], [72], [80], [89] Top Level Domain features 22 U,W,E [36], [38], [43], [46], [65], [69], [70], [78], [85], uW: [105], [107], [110], [113], [138], [139], [152], [154], [157], uE: [163], [170], [182], [194] TTL c value of DNS 9 U,W,E [28], [43], [47], [70], uW: [93], [102], [132], [144], uE: [186] Age of Domain 13 U,W,E [52], uW: [107], [113], [119], [120], [124], [125], [127], [132], [150],…”
Section: Dns Basedmentioning
confidence: 99%
“…ML methods [8] are also dependent on the set of features extracted for each web page and further require ground truth phishing and legitimate websites for training. The quality and variety of websites in this training set has a strong effect on the final detection accuracy [9], and it can be expensive to obtain a training set that is suitably sized and diverse.…”
Section: Introductionmentioning
confidence: 99%