Heuristic nonlinear regression strategy for detecting phishing websites

被引:58
|
作者
Babagoli, Mehdi [1 ]
Aghababa, Mohammad Pourmahmood [2 ]
Solouk, Vahid [1 ]
机构
[1] Urmia Univ Technol, Fac Comp Engn, Orumiyeh, Iran
[2] Urmia Univ Technol, Fac Elect Engn, Orumiyeh, Iran
关键词
Phishing; SVM; Harmony search; Feature selection; Decision tree; Wrapper; Nonlinear regression; HARMONY SEARCH ALGORITHM; CLASSIFICATION;
D O I
10.1007/s00500-018-3084-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a method of phishing website detection that utilizes a meta-heuristic-based nonlinear regression algorithm together with a feature selection approach. In order to validate the proposed method, we used a dataset comprised of 11055 phishing and legitimate webpages, and select 20 features to be extracted from the mentioned websites. This research utilizes two feature selection methods: decision tree and wrapper to select the best feature subset, while the latter incurred the detection accuracy rate as high as 96.32%. After the feature selection process, two meta-heuristic algorithms are successfully implemented to predict and detect the fraudulent websites: harmony search (HS) which was deployed based on nonlinear regression technique and support vector machine (SVM). The nonlinear regression approach was used to classify the websites, where the parameters of the proposed regression model were obtained using HS algorithm. The proposed HS algorithm uses dynamic pitch adjustment rate and generated new harmony. The nonlinear regression based on HS led to accuracy rates of 94.13 and 92.80% for train and test processes, respectively. As a result, the study finds that the nonlinear regression-based HS results in better performance compared to SVM.
引用
收藏
页码:4315 / 4327
页数:13
相关论文
共 50 条
  • [31] The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
    Gopali, Saroj
    Namin, Akbar S.
    Abri, Faranak
    Jones, Keith S.
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1064 - 1066
  • [33] Improving the Feature Section Method Based on Genetic Algorithm to Increase the Efficiency of Detecting Phishing Websites
    Davoudi, Mohamad Reza
    Yari, Ali Reza
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (03) : 213 - 221
  • [34] Detecting phishing websites through improving convolutional neural networks with Self-Attention mechanism
    Said, Yahia
    Alsheikhy, Ahmed A.
    Lahza, Husam
    Shawly, Tawfeeq
    AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (04)
  • [35] Real Time Detection of Phishing Websites
    Ahmed, Abdulghani Ali
    Abdullah, Nurul Amirah
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [36] On Feature Selection for the Prediction of Phishing Websites
    Fadheel, Wesam
    Abusharkh, Mohamed
    Abdel-Qader, Ikhlas
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 871 - 876
  • [37] Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites
    Drury, Vincent
    Meyer, Ulrike
    PROCEEDINGS OF THE FIFTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2019), 2019, : 211 - 223
  • [38] An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 105 - +
  • [39] Heuristic-based strategy for Phishing prediction: A survey of URL-based approach
    Revoredo da Silva, Carlo Marcelo
    Feitosa, Eduardo Luzeiro
    Garcia, Vinicius Cardoso
    COMPUTERS & SECURITY, 2020, 88
  • [40] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 405 - 410