scispace - formally typeset
Open AccessProceedings ArticleDOI

PhishOut: Effective Phishing Detection Using Selected Features

TLDR
Six machine-learning approaches to detect phishing based on a small number of carefully chosen features are compared and Naive Bayes has the least true positives rate and overall Neural Networks holds the most promise for accurate phishing detection with accuracy of 99.4%.
Abstract
Phishing emails are the first step for many of today’s attacks. They come with a simple hyperlink, request for action or a full replica of an existing service or website. The goal is generally to trick the user to voluntarily give away his sensitive information such as login credentials. Many approaches and applications have been proposed and developed to catch and filter phishing emails. However, the problem still lacks a complete and comprehensive solution. In this paper, we apply knowledge discovery principles from data cleansing, integration, selection, aggregation, data mining to knowledge extraction. We study the feature effectiveness based on Information Gain and contribute two new features to the literature. We compare six machine-learning approaches to detect phishing based on a small number of carefully chosen features. We calculate false positives, false negatives, mean absolute error, recall, precision and F-measure and achieve very low false positive and negative rates. Naive Bayes has the least true positives rate and overall Neural Networks holds the most promise for accurate phishing detection with accuracy of 99.4%.

read more

Citations
More filters
Proceedings ArticleDOI

A Comparative Study on Email Phishing Detection Using Machine Learning Techniques

TL;DR: In this paper , a comparison of previous studies in commonly used Supervised Machine Learning techniques on detecting the phishing email attack such as Decision Tree (DT), Naive Bayes (NB), Random Forest (RF), and Support Vector machine(SVM).
Journal ArticleDOI

Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership

TL;DR: In this paper , the authors explored the role of cybersecurity leadership in financial organizations in preventing cyberattacks and investigated other human and non-technical factors related to the individual in financial organisations.
Proceedings ArticleDOI

Accuracy Comparison of Different Machine Learning Models in Phishing Detection

TL;DR: In this paper , the authors compared different machine learning algorithms to detect whether a URL is a legitimate URL or a phishing URL with a certain feature using a Web page phishing detection dataset.
References
More filters
Journal ArticleDOI

The random subspace method for constructing decision forests

TL;DR: A method to construct a decision tree based classifier is proposed that maintains highest accuracy on training data and improves on generalization accuracy as it grows in complexity.
Proceedings ArticleDOI

Learning to detect phishing emails

TL;DR: This method is applicable, with slight modification, to detection of phishing websites, or the emails used to direct victims to these sites, and correctly identify over 96% of the phishing emails while only mis-classifying on the order of 0.1%" of the legitimate emails.
Proceedings Article

Client-Side Defense Against Web-Based Identity Theft.

TL;DR: A framework for client-side defense is proposed: a browser plug-in that examines web pages and warns the user when requests for data may be part of a spoof attack.
Journal ArticleDOI

The state of phishing attacks

TL;DR: Looking past the systems people use, they target the people using the systems.
Related Papers (5)