Open Access   Article Go Back

An Ensemble Approach for Detecting Phishing Attacks

Himanshi Agrawal1 , Rajni Ranjan Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-7 , Page no. 53-59, Jul-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i7.5359

Online published on Jul 31, 2021

Copyright © Himanshi Agrawal, Rajni Ranjan Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Himanshi Agrawal, Rajni Ranjan Singh, “An Ensemble Approach for Detecting Phishing Attacks,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.53-59, 2021.

MLA Style Citation: Himanshi Agrawal, Rajni Ranjan Singh "An Ensemble Approach for Detecting Phishing Attacks." International Journal of Computer Sciences and Engineering 9.7 (2021): 53-59.

APA Style Citation: Himanshi Agrawal, Rajni Ranjan Singh, (2021). An Ensemble Approach for Detecting Phishing Attacks. International Journal of Computer Sciences and Engineering, 9(7), 53-59.

BibTex Style Citation:
@article{Agrawal_2021,
author = {Himanshi Agrawal, Rajni Ranjan Singh},
title = {An Ensemble Approach for Detecting Phishing Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2021},
volume = {9},
Issue = {7},
month = {7},
year = {2021},
issn = {2347-2693},
pages = {53-59},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5364},
doi = {https://doi.org/10.26438/ijcse/v9i7.5359}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i7.5359}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5364
TI - An Ensemble Approach for Detecting Phishing Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Himanshi Agrawal, Rajni Ranjan Singh
PY - 2021
DA - 2021/07/31
PB - IJCSE, Indore, INDIA
SP - 53-59
IS - 7
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
413 518 downloads 177 downloads
  
  
           

Abstract

In cyberspace, phishing is one of several cybercrimes that often target internet users all over the world. Phishing performs by trying to trick the victim into accessing a web page which looks original, then instructing them to send important data. For prevention, it is essential to build a phishing detection system (PDS). Recent phishing detection system based on data mining and machine learning techniques. Development of an effective detection system while minimizing false positives and negatives is still a challenge. Instead of using single classification approach it would be better to use ensemble approach. In this work an ensemble approach is utilized to build a phishing website classification system. Bagging also known as Bootstrap Aggregating is a meta algorithm established to enhance the machine learning algorithms performance. To detect phishing website various classification models have been developed and implemented. It is observed that combination of Bagging, AdaBoost and j48 gives best results that is 97.2% accuracy.

Key-Words / Index Term

Meta-algorithm, classification, web phishing, website, internet, cyber security

References

[1] F. Furedi, “How the Internet and social media are changing culture,” 2015. [Accessed: 22-Apr-2019].
[2] M. Chewae, S. Hayikader, H. Hasan, and J. Ibrahim, “How Much Privacy We Still Have on Social Network?,” Int. J. Sci. Res. Publ., vol. 5, no. 1, pp. 1– 5, 2015.
[3] P. Patil, R. Rane, and M. Bhalekar, “Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm,” Proc. Int. Conf. Inven. Syst. Control. ICISC 2017, pp. 1–4, 2017.
[4] M. Ganesan and P. Mayilvahanan, “Cyber Crime Analysis in Social Media Using Data Mining Technique,” Int. J. Pure Appl. Math., vol. 116, no. 22, pp. 413–424, 2017.
[5] R. Pompon, D. Walkowski, S. Boddy, and M. Levin, “2018 Phishing and Fraud Report: Attacks Peak During the Holidays” 2018. [Accessed: 20- Apr-2019].
[6] Pritesh Saklecha, Jagdish Raikwar, "Prevention of Phishing Attack using Hybrid Blacklist Recommendation Algorithm", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.188-191, 2018.
[7] P.Priyadevi, V.Lalithadevi, M.Sughashini, "An Efficient and Usable Client-Side Phishing Detection Application", International Journal of Computer Sciences and Engineering, Vol.06, Special Issue.02, pp.398-401, 2018.
[8] M. Karabatak and T. Mustafa, “Performance comparison of classifiers on reduced phishing website dataset,” in International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 1– 5.
[9] A. Subasi, E. Molah, F. Almkallawi, and T. J. Chaudhery, “Intelligent phishing website detection using random forest classifier,” 2017 Int. Conf. Electr. Comput. Technol. Appl. ICECTA 2017, vol. 2018-January, pp. 1–5, 2018.
[10] R. M. Mohammad, F. Thabtah, and L. McCluskey, “Intelligent rule-based phishing websites classification,” IET Inf. Secur., vol. 8, no. 3, pp. 153– 160, 2014.
[11] L. Rahman, N. A. Setiawan, and A. E. Permanasari, “Feature Selection Methods in Improving Accuracyof Classifying Students’ Academic Performance,” 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. (ICITISEE)., no. 1, pp. 267–271, 2017.
[12] A. F. Nugraha, & L. Rahman, “Meta-Algorithms for Improving Classification Performance in the Web-phishing Detection Process”. In 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 271-275). IEEE.
[13] UCI Machine Learning, “UCI Machine Learning Repository?: Phising Websites Data Set,” 2019. [Accessed: 20-Apr-2019].
[14] R. M. Mohammad, F. Thabtah, and L. Mccluskey, “Phishing Websites Features,” Ieee. pp. 1–7, 2013.
[15] L. Breiman, “Bagging predictors,” Dep. Stat. Univ. Calif., no. 2, p. 19, 1994.
[16] L. Chen, “Basic Ensemble Learning (Random Forest, AdaBoost, Gradient Boosting)- Step by Step Explained,” 2016. [Accessed: 20-Apr-2019].
[17] Y. Freund and R. E. Schapire, “A Short Introduction to Boosting,” J. Japanese Soc. Artif. Intell., vol. 14, no. 5, pp. 771–780, 1999.
[18] V. Estivill-Castro, M. Lombardi, and A. Marani, “Improving binary classification of web pages using an ensemble of feature selection algorithms,” ACM Int. Conf. Proceeding Ser., 2018
[19] Md. Nurul Amin, Md. Ahsan Habib "Comparison of Different Classification Techniques Using WEKA for Hematological Data" American Journal of Engineering Research (AJER).
[20] N. Saravanan, V. Gayathari “Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)” In 2018 International Journal of Computational Intelligence and Informatics.