Skip to main content

Dynamic Recognition of Phishing URLs Using Deep Learning Techniques

  • Chapter
  • First Online:
Advances in Cyber Security Analytics and Decision Systems

Abstract

Phishing is a critical issue that faces the digital security. The straightforwardness of the web and Internet uncovered open doors for offenders to transfer malevolent substance at the same time with the upgrade of online business trades, for example, phishing – the demonstration of taking individual data which ascends in number. Internet clients’ costs have been increased to billions of dollars for each year due to phishing. Phishers use parodied email, Uniform Resource Locator (URL) locations of phony sites, and phishing programming to take individual data and monetary record subtleties, for example, usernames and passwords. The boycott system is definitely not a sufficient method to remain safe from the cybercriminals. Hence, phishing site pointers must be considered for this reason, with the presence and utilization of machine learning calculations. The current techniques make utilization of all separated attributes in the phishing URL location, prompting high false positive rate.

In this manner, the proposed work manages strategies for distinguishing phishing web destinations by investigating different attributes of genuine and phishing URLs utilizing profound learning procedures, for example, deep Boltzmann machine (DBM), stacked auto-encoder (SAE), and deep neural network (DNN). DBM and SAE are utilized for pre-preparing the model with a superior portrayal of data for attribute determination, among which SAE has accomplished lower misclassification mistake with nine and includes a diminished list of attributes and DNN is utilized for twofold grouping in distinguishing obscure URL as either a phishing URL or a genuine URL. The proposed framework accomplishes higher location rate of 94% with low false positive rate than other machine learning strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anti-Phishing Working Group (APWG). (2010). Phishing activity trends report second half 2010, http://apwg.org/reports/apwg report h2 2010.pdf. Accessed Dec 2011.

  • Anti-Phishing Working Group (APWG). (2011a). Phishing activity trends report first half 2011, http://apwg.org/reports/apwg trends reporth12011.pdf. Accessed Dec 2011.

  • Anti-Phishing Working Group (APWG). (2011b). Phishing activity trends report second half 2011, http://apwg.org/reports/apwg trends reporth22011.pdf. Accessed July 2012.

  • Bergholz, A., De Beer, J., Glahn, S., Moens, M.-F., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of Computer Security, 18, 7–35.

    Article  Google Scholar 

  • Brewster, K., & Bruce, G. (1996). The Web Information Company., www.alexa.com

  • Cao, Y., Han, W., & Le, Y. (2008). Anti-phishing based on automated individual white-list. In DIM ‘08: Proceedings of the 4th ACM workshop on digital identity management (pp. 51–60). New York: ACM.

    Chapter  Google Scholar 

  • Chen, K.-T., Chen, J.-Y., Huang, C.-R., & Chen, C.-S. (2009). Fighting phishing with discriminative keypoint features. Internet Computing, IEEE, 13(3), 56–63.

    Article  Google Scholar 

  • Chou, N., Ledesma, R., Teraguchi, Y., & Mitchell, J. C. (2004). Client-side defense against web-based identity theft. In NDSS. The Internet Society.

    Google Scholar 

  • David Ulevitch. (2006). PhishTank. http://www.phishtank.com

  • Dong, X., Clark, J., & Jacob, J. (2008). Modelling user-phishing interaction in Human System Interactions, Conference on, 2008, May, pp. 627–632.

    Google Scholar 

  • Downs, J. S., Holbrook, M., & Cranor, L. F. (2007). Behavioral response to phishing risk. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. eCrime ‘07 (pp. 37–44). New York: ACM.

    Chapter  Google Scholar 

  • Google. Google safe browsing API, http://code.google.com/apis/safebrowsing/. Accessed Oct 2011.

  • Hara, M., Yamada, A., & Miyake, Y. (2009). Visual similarity-based phishing detection without victim site information. In IEEE symposium on computational intelligence in cyber security, 2009. CICS ‘09 (pp. 30–36).

    Chapter  Google Scholar 

  • Holz, T., Gorecki, C., Rieck, K., & Freiling, F. C. (2008). Measuring and detecting fast-flux service networks. In Proceedings of the network and distributed system security symposium (NDSS).

    Google Scholar 

  • Huang, H., Tan, J., & Liu, L. (2009). Countermeasure techniques for deceptive phishing attack. In International conference on new trends in information and service science, 2009. NISS ‘09 (pp. 636–641).

    Chapter  Google Scholar 

  • Ian Rogers. (2002). Google Page Rank – Whitepaper, http://www.srigroane.net/google-page-rank/, http://www.prchecker.info/check_page_rank.php

  • James, J., Sandhya, L., & Thomas, C. (2013). Detection of phishing URLs using machine learning techniques. IEEE international conference on control communication and computing (ICCC).

    Google Scholar 

  • Knickerbocker, P., Yu, D., & Li, J. (2009). Humboldt: A distributed phishing disruption system. In eCrime researchers summit (pp. 1–12).

    Google Scholar 

  • Krebs, B. (2011). HBGary Federal hacked by Anonymous, http: //krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, Accessed Dec 2011.

  • Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007). Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the SIGCHI conference on human factors in computing systems, ser. CHI ‘07 (pp. 905–914). New York: ACM.

    Google Scholar 

  • Likarish, P., Dunbar, D., & Hansen, T. E. (2008). Phishguard: A browser plug-in for protection from phishing. In 2 international conference on internet multimedia services architecture and applications, 2008. IMSAA 2008 (pp. 1–6).

    Google Scholar 

  • Moore, T., & Clayton, R. (2007). Examining the impact of website take-down on phishing. In eCrime ‘07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit (pp. 1–13). New York: ACM.

    Google Scholar 

  • Prakash, P., Kumar, M., Kompella, R. R., & Gupta, M. (2010). Phishnet: Predictive blacklisting to detect phishing attacks. In INFOCOM’10: Proceedings of the 29th conference on information communications (pp. 346–350). Piscataway: IEEE Press.

    Google Scholar 

  • Rich Skrenta, & Bob Truel. (1998). DMOZ Open Directory Project. http://www.dmoz.org

  • Salakhutdinov, R. R., & Larochelle, H. (2010). Efficient learning of deep Boltzmann machines. In Proceedings of the international conference on artificial intelligence and statistics (Vol. 13).

    Google Scholar 

  • Schneier, B. (2011). Lockheed Martin hack linked to RSA’s SecurID breach, http://www.schneier.com/blog/archives/2011/05/lockheed martin.html, Accessed Dec 2011.

  • Selvaganapathy, S. G., Nivaashini, M., & Natarajan, H. P. (2018). Deep belief network based detection and categorization of malicious URLs. Information Security Journal: A Global Perspective, 27(3), 145–161. https://doi.org/10.1080/19393555.2018.1456577.

    Article  Google Scholar 

  • Sewak, M., Karim, M. R., & Pujari, P. (2018). Practical convolutional neural network models: Implement advanced deep learning models using Python. Packt Publishing Ltd. Birmingham, United Kingdom.

    Google Scholar 

  • Sheng, S., Wardman, B., Warner, G., Cranor, L. F., Hong, J., & Zhang, C. (2009, July). An empirical analysis of phishing blacklists. In Proceedings of the 6th conference in email and anti-spam, ser. CEAS’09. Mountain view.

    Google Scholar 

  • Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the 28 international conference on human factors in computing systems, ser. CHI ‘10 (pp. 373–382). New York: ACM.

    Google Scholar 

  • Statistical & Qualitative Data Analysis Software: (2019) About R and RStudio. https://libguides.library.kent.edu/statconsulting/r

  • Weider, D., Yu, Nargundkar, S., & Tiruthani, N. (July 2008). A phishing vulnerability analysis of web based systems. In Proceedings of the 13th IEEE symposium on computers and communications (ISCC 2008) (pp. 326–331). Marrakech: IEEE.

    Google Scholar 

  • Whittaker, C., Ryner, B., & Nazif, M. (2010). Large-scale automatic classification of phishing pages. In NDSS ‘10.

    Google Scholar 

  • WHOIS look up., www.whois.net, www.whois.com

  • Yoshua, B., & Pascal, L. (2007). Greedy layer-wise training of deep networks. In Advances in neural networks.

    Google Scholar 

  • Yue, C., & Wang, H. (2008). Anti-phishing in offense and defense. In Computer security applications conference, ACSAC 2008. Annual, 8–12 2008 (pp. 345–354).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sountharrajan, S., Nivashini, M., Shandilya, S.K., Suganya, E., Bazila Banu, A., Karthiga, M. (2020). Dynamic Recognition of Phishing URLs Using Deep Learning Techniques. In: Shandilya, S., Wagner, N., Nagar, A. (eds) Advances in Cyber Security Analytics and Decision Systems. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-19353-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19353-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19352-2

  • Online ISBN: 978-3-030-19353-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics