2020
DOI: 10.1108/el-01-2020-0016
|View full text |Cite
|
Sign up to set email alerts
|

Identification of phishing websites through hyperlink analysis and rule extraction

Abstract: Purpose The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of phishing websites and identify them accurately. Design/methodology/approach Hyperlink indicators along with URL-based features are used to build the identification model. In the proposed approach, very simple rules are first extracted based on individual features to provide meaningful and easy-to-understand rules. Then, the F-meas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 47 publications
(75 reference statements)
0
7
0
Order By: Relevance
“…After reviewing 33 papers concerned with phishing, DM, and ML techniques from 2018 to 2021, it was demonstrated that much effort has been put together to find and create models that can detect and differentiate between phishing and legitimate websites. Some studies focused on detecting phishing websites by finding relationships between the URL characters [25] , while others used URL features [22,25,28] . References [21,26] used a different technique to analyze hyperlinks through integration rules from which suspicious ones can detected.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…After reviewing 33 papers concerned with phishing, DM, and ML techniques from 2018 to 2021, it was demonstrated that much effort has been put together to find and create models that can detect and differentiate between phishing and legitimate websites. Some studies focused on detecting phishing websites by finding relationships between the URL characters [25] , while others used URL features [22,25,28] . References [21,26] used a different technique to analyze hyperlinks through integration rules from which suspicious ones can detected.…”
Section: Resultsmentioning
confidence: 99%
“…The researchers proposed an integrated model that features combinations of images, text, and frames in the detection process. The results show that different algorithms were used, and multiple models were created by combining two to four techniques to get better results [24,25,27,[29][30][31][32] . Other studies used multiple models and compared their results to find the best approach [6,11,28,34] .…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In another paper, URLs and hyperlinks are passed through certain rules and features are obtained [20]. An accuracy of 99.80 % was obtained as a result of the artificial neural network used in the dataset created with 1,000 legitimate URLs from Alexa database and 1,000 phishing URLs from the PhishTank website.…”
Section: Related Workmentioning
confidence: 99%