Phishing Attack Detection using Machine Learning Classification Techniques
Title | Phishing Attack Detection using Machine Learning Classification Techniques |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Abedin, N. F., Bawm, R., Sarwar, T., Saifuddin, M., Rahman, M. A., Hossain, S. |
Conference Name | 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS) |
Date Published | Dec. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7089-3 |
Keywords | artificial intelligence, Classification algorithms, composability, Computer science, Conferences, Decision Tree, defense, Logistics, machine learning, Metrics, phishing, phishing attack, phishing attack detection, pubcrawl, resilience, Resiliency, Training, Uniform resource locators, Zero day attacks |
Abstract | Phishing attacks are the most common form of attacks that can happen over the internet. This method involves attackers attempting to collect data of a user without his/her consent through emails, URLs, and any other link that leads to a deceptive page where a user is persuaded to commit specific actions that can lead to the successful completion of an attack. These attacks can allow an attacker to collect vital information of the user that can often allow the attacker to impersonate the victim and get things done that only the victim should have been able to do, such as carry out transactions, or message someone else, or simply accessing the victim's data. Many studies have been carried out to discuss possible approaches to prevent such attacks. This research work includes three machine learning algorithms to predict any websites' phishing status. In the experimentation these models are trained using URL based features and attempted to prevent Zero-Day attacks by using proposed software proposal that differentiates the legitimate websites and phishing websites by analyzing the website's URL. From observations, the random forest classifier performed with a precision of 97%, a recall 99%, and F1 Score is 97%. Proposed model is fast and efficient as it only works based on the URL and it does not use other resources for analysis, as was the case for past studies. |
URL | https://ieeexplore.ieee.org/abstract/document/9315895 |
DOI | 10.1109/ICISS49785.2020.9315895 |
Citation Key | abedin_phishing_2020 |