![]() |
Center for Open Access in Science (COAS) OPEN JOURNAL FOR INFORMATION TECHNOLOGY (OJIT) ISSN (Online) 2620-0627 * ojit@centerprode.com |
A Classifier Model to Detect Phishing Emails Using Ensemble Technique Fredrick Nthurima Abraham Matheka Open Journal for Information Technology, 2023, 6(2), 157-172 * https://doi.org/10.32591/coas.ojit.0602.06157n LICENCE: Creative Commons Attribution 4.0 International License. ARTICLE (Full Text - PDF) |
ABSTRACT: KEY WORDS: extractive model, abstractive model, hybrid model, natural language processing. CORRESPONDING AUTHOR: |
REFERENCES: Abdelhamid, N., & Thabtah, F. (2014). Associative classification approaches: Review and comparison. Journal of Information and Knowledge Management (JIKM), 13(3). Aburrous, M., Hossain, M., Dahal, K. P., & Thabtah, F. (2010). Experimental case studies for investigating e-banking phishing techniques and attack strategies. Journal of Cognitive Computation, 2(3), 242-253. Afroz, S., & Greenstadt, R. (2011). PhishZoo: Detecting phishing websites by looking at them. In Fifth International Conference on Semantic Computing (18-21 September). Palo Alto, California USA, 2011. IEEE. Akinyelu, A. A., & Adewumi, A. O. (2014). Classification of phishing emails using random forest machine learning technique. Journal of Applied Mathematics, vol. 2014, Article ID 425731, 6 pages, 2014. Altaher, A., Wan, T. C., & ALmomani, A., (2012). Evolving fuzzy neural network for phishing emails detection. Journal of Computer Science, 8(7). APWG Phishing Attack Trends Reports (2018). https://www.antiphishing.org/resources/apwg-reports/. Basnet, R., Mukkamala, S., & Sung, A. H. (2008). Detection of phishing attacks: A machine learning approach. Soft Computing Applications Industry, pp. 373-383. Bayesian network classifiers in Weka (2004). Working paper series. University of Waikato, Department of Computer Science. No. 14/2004. Hamilton, New Zealand: University of Waikato. Behdad, M., French, T., Bennamoun, T., & Barone, L. (2012). Nature-inspired techniques in the context of fraud detection. IEEE Transactions on Systems, Man, and Cybernetics C. Bouckaert, R. (2004). Bayesian network classifiers in Weka (Working paper series. University of Waikato, Department of Computer Science. No. 14/2004). Hamilton, New Zealand: University. Brown, S., Ofoghi, B., Ma, L., & Watters, P. (2017). Detecting phishing emails using hybrid features. Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (UIC-ATC ‘17), IEEE, Australia.
Emigh, A. (2016). Phishing attacks: information flow and chokepoints. In Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. USA. Fette, I., Sadeh, N., & Tomasic, A. (2017). Learning to detect phishing emails. Proceedings of the 16th international conference on the World Wide Web. 649-656. Freund, Y., & Schapire, R. E. (1997). A decision-theoretic generalization of online learning and an application to boosting. Journal of Computer and System Sciences, 55(1), 119-139. Gaines, B. R., & Compton, J. P. (1995). Induction of ripple-down rules applied to modeling large databases. Intell. Inf. Syst., 5(3), 211-228. Gupta, M., Prakash, P., Kompella, R. R., & Kumar, M. (2015). PhishNet: Predictive blacklisting to detect phishing attacks. IEEE Conference on Computer Communications. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. (2009). The WEKA Data Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1. Han, W., Cao, Y., & Le, Y. (2015). Anti-phishing based on automated individual white-list. 4th ACM workshop on digital identity management (DIM) (pp. 51-59). ACM USA. Holte, R. C. (1993). Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11, 63-90. Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Computer security applications. 27th Annual Computer Security Applications Conference. Khonji, M, Jones, A., & Iraqi, Y. (2013). Phishing detection: A literature survey. IEEE Communications & Surveys Tutorials. Ledesma, R., Chou, N., Mitchell, J. C., & Teraguchi, Y. (2014). Client-side defense against web-based identity theft. 11th Annual Network & Distributed System Security Symposium. USA. Mitchell, T. M. (1997). Machine learning. McGraw-Hill, New York, NY, USA. Mohammad, R., Thabtah, F., & McCluskey L. (2015B). Phishing websites dataset. Available: https://archive.ics.uci.edu/ml/datasets/Phishing+Websites. Accessed January 2016. Mohammad, R., Thabtah F., & McCluskey L. (2014A). Predicting phishing websites based on self-structuring neural network. Journal of Neural Computing and Applications, 25(2), 443-458. ISSN 0941-0643. Springer. Mohammad, R. M., Thabtah, F., & McCluskey, L. (2013). Predicting phishing websites using neural network trained with back-propagation. Las Vegas, World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 682-686. Nargundkar, S., Tiruthani, N., & Yu, W. D. (2017). PhishCatch – A phishing detection tool. 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC '17), USA. Nazif, M., Ryner, B., & Whittaker, C. (2010). Large-scale automatic classification of phishing pages. 17th Annual Network & Distributed System Security Symposium (NDSS '10). The Internet Society, USA. Platt, J. (1998). Fast training of SVM using sequential optimization: Advances in kernel methods support vector learning. MIT Press, Cambridge, 1998, pp. 185-208. Qabajeh I., Thabtah, F., & Chiclana, F. (2015). Dynamic classification rules data mining method. Journal of Management Analytics, 2(3), 233-253. Sadeh, N., Fette, I., & Tomasic, A. (2017). Learning to detect phishing emails. 16th International World Wide Web Conference (WWW '17). Canada. Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the 28th international conference on human factors in computing systems - CHI ‘10, 373–382. https://doi.org/10.1145/1753326.1753383 Smadi, S., Aslam, N., Zhang, L., Alasem, R., & Hossain, M. A. (2015). Detection of phishing emails using data mining algorithms. 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).
Sung, A. H., Basnet, R., & Mukkamala, S. (2008). Detection of phishing attacks: A machine learning approach. In Soft Computing Applications in Industry. Germany. Tan, C. L., Chiew, K. L., & Sze, S. N. (2017). Phishing webpage detection using weighted URL tokens for identity keywords retrieval. In Ibrahim, H., Iqbal, S., Teoh. S., & Mustaffa, M. (Eds). 9th International conference on Robotic, Vision, Signal Processing and Power Applications. Lecture Notes in Electrical Engineering. Vol. 398. Springer, Singapore. Thabtah, F., Mohammad, R., & McCluskey, L. (2016B). A dynamic self-structuring neural network model to combat phishing. In Proceedings of the 2016 IEEE World Congress on Computational Intelligence. Vancouver, Canada. Thabtah, F., Qabajeh, I.., & Chiclana, F. (2016A). Constrained dynamic rule induction learning. Expert Systems with Applications, 63, 74-85. Wattenhofer, R., Burri, N., & Albrecht, K. (2015). Spamato-an extendable spam filter system. In Proceedings of the 2nd Conference on Email and Anti-Spam (CEAS '15). USA. Witten, I. H., & Frank, E. (2005). Data mining: Practical machine learning tools and techniques. PubMed Central. Yuan, Y., & Zhang, N. (2012). Phishing detection using neural network. http://cs229.stanford.edu/proj2012/ZhangYuan-PhishingDetectionUsingNeuralNetwork.pdf Zhang, Y., Cranor, L. F., Hong, J. I, & Egelman, S. (2016). Finding phish: an evaluation of anti-phishing toolbars. 14th Annual Network & Distributed System Security Symposium. USA.
|
© Center for Open Access in Science