Skip to main content

Testing Phishing Detection Criteria and Methods

  • Chapter
Frontiers in Computer Education

Abstract

Phishing attacks have increased in the last years despite the use of anti-phishing filters. This is mainly caused by the diversity of phishers trials and the improvement on targeting potential victims on internet. Usually phishers employ social engineering techniques trying to convince users to supply confidential data using the email as the dissemination vehicle. Phishers disguise attacks as trustworthy organizations by cloning websites. According to international monitoring, phishing causes real injury mainly to banks and government institutions. This paper proposes important features to detect phishing attacks employing data mining techniques to evaluate and compare them. In this work we have used public corpora of phishing messages. As a main result we have identified main phishing detection criteria, which have been evaluated and best accurate results were achieved using neural nets and decision trees.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bradley, T.: Essential Computer Security: Everyone’s Guide to E-mail, Internet, and Wireless Security, Syngress (2006)

    Google Scholar 

  2. Gregg, M.: Hach the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Syngress (2006)

    Google Scholar 

  3. Cajani, F., Costabile, G., Mazzaraco, G.: Phishing e Furto d’Identita Digitale. Giure (2008)

    Google Scholar 

  4. James, L.: Phishing Exposed. Syngress (2005)

    Google Scholar 

  5. Lininger, R., Vines, R.D.: Pishing: Cutting the Identity Theft Line. Wiley (2005)

    Google Scholar 

  6. Fette, I., Sadeh, N., Tomasic, A.: Learning to Detect Phishing Emails, pp. 649–656. ACM (2007)

    Google Scholar 

  7. Suriya, R., Saravanan, K., Thangavelu, A.: An Integrated Approach to Detect Phishing Mail Attacks A Case Study, pp. 193–199. ACM (2009)

    Google Scholar 

  8. Yearwood, J., Mammadov, M., Banerjee, A.: Profiling Phishing Emails Based on Hyperlink Information, pp. 120–127. IEEE (2010)

    Google Scholar 

  9. Ma, L., Ofoghi, B., Watters, P., Brown, S.: Detecting Phishing Emails Using Hybrid Features, pp. 493–497. IEEE (2009)

    Google Scholar 

  10. Yu, W.D., Nargundkar, S., Tiruthani, N.: Phishcatch - A Phishing Detection Tool, pp. 451–456. IEEE (2009)

    Google Scholar 

  11. Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing E-mail Detection Based on Structural Properties. In: 9th New York Cyber Security Conference, pp. 2–8 (2009)

    Google Scholar 

  12. Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.: Advances in Knowloedge Discovery and Data Mining. MIT Press (1996)

    Google Scholar 

  13. Nazario, J.: Phishing corpus (2010), http://monkey.org/jose/wiki/doku.php?id=phishingcorpus

  14. Androutsopoulos, I.: Ling-spam, http://labs-repos.iit.demokritos.gr/skel/i-config/downloads (2010)

  15. Witten, I.H., Frank, E.: Practical Machine Learning Tools and Techniques, 2nd edn. Elsevier (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carine G. Webber .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this chapter

Cite this chapter

Webber, C.G., de Fátima W. do Prado Lima, M., Hepp, F.S. (2012). Testing Phishing Detection Criteria and Methods. In: Sambath, S., Zhu, E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27552-4_112

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27552-4_112

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27551-7

  • Online ISBN: 978-3-642-27552-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics