Abstract
Phishing attacks have increased in the last years despite the use of anti-phishing filters. This is mainly caused by the diversity of phishers trials and the improvement on targeting potential victims on internet. Usually phishers employ social engineering techniques trying to convince users to supply confidential data using the email as the dissemination vehicle. Phishers disguise attacks as trustworthy organizations by cloning websites. According to international monitoring, phishing causes real injury mainly to banks and government institutions. This paper proposes important features to detect phishing attacks employing data mining techniques to evaluate and compare them. In this work we have used public corpora of phishing messages. As a main result we have identified main phishing detection criteria, which have been evaluated and best accurate results were achieved using neural nets and decision trees.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bradley, T.: Essential Computer Security: Everyone’s Guide to E-mail, Internet, and Wireless Security, Syngress (2006)
Gregg, M.: Hach the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Syngress (2006)
Cajani, F., Costabile, G., Mazzaraco, G.: Phishing e Furto d’Identita Digitale. Giure (2008)
James, L.: Phishing Exposed. Syngress (2005)
Lininger, R., Vines, R.D.: Pishing: Cutting the Identity Theft Line. Wiley (2005)
Fette, I., Sadeh, N., Tomasic, A.: Learning to Detect Phishing Emails, pp. 649–656. ACM (2007)
Suriya, R., Saravanan, K., Thangavelu, A.: An Integrated Approach to Detect Phishing Mail Attacks A Case Study, pp. 193–199. ACM (2009)
Yearwood, J., Mammadov, M., Banerjee, A.: Profiling Phishing Emails Based on Hyperlink Information, pp. 120–127. IEEE (2010)
Ma, L., Ofoghi, B., Watters, P., Brown, S.: Detecting Phishing Emails Using Hybrid Features, pp. 493–497. IEEE (2009)
Yu, W.D., Nargundkar, S., Tiruthani, N.: Phishcatch - A Phishing Detection Tool, pp. 451–456. IEEE (2009)
Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing E-mail Detection Based on Structural Properties. In: 9th New York Cyber Security Conference, pp. 2–8 (2009)
Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.: Advances in Knowloedge Discovery and Data Mining. MIT Press (1996)
Nazario, J.: Phishing corpus (2010), http://monkey.org/jose/wiki/doku.php?id=phishingcorpus
Androutsopoulos, I.: Ling-spam, http://labs-repos.iit.demokritos.gr/skel/i-config/downloads (2010)
Witten, I.H., Frank, E.: Practical Machine Learning Tools and Techniques, 2nd edn. Elsevier (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this chapter
Cite this chapter
Webber, C.G., de Fátima W. do Prado Lima, M., Hepp, F.S. (2012). Testing Phishing Detection Criteria and Methods. In: Sambath, S., Zhu, E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27552-4_112
Download citation
DOI: https://doi.org/10.1007/978-3-642-27552-4_112
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27551-7
Online ISBN: 978-3-642-27552-4
eBook Packages: EngineeringEngineering (R0)