Predicting phishing websites using classification mining techniques with experimental case studies

Maher Aburrous, Alamgir Hossain, Keshav Dahal, Fadi Thabtah

    Research output: Contribution to conferencePaperpeer-review

    44 Citations (Scopus)

    Abstract

    Classification Data Mining (DM) Techniques can be a very useful tool in detecting and identifying e-banking phishing websites. In this paper, we present a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. We implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy. We also compared their performances, accuracy, number of rules generated and speed. A Phishing Case study was applied to illustrate the website phishing process. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity, and Security and Encryption criteria in the final phishing detection rate. The experimental results demonstrated the feasibility of using Associative Classification techniques in real applications and its better performance as compared to other traditional classifications algorithms.
    Original languageEnglish
    DOIs
    Publication statusPublished - Apr 2010
    Event7th International conference on Information Technology: New generations (ITNG) - Las Vegas, NV, USA
    Duration: 1 Apr 2010 → …

    Conference

    Conference7th International conference on Information Technology: New generations (ITNG)
    Period1/04/10 → …

    Fingerprint Dive into the research topics of 'Predicting phishing websites using classification mining techniques with experimental case studies'. Together they form a unique fingerprint.

    Cite this