320
Views
3
CrossRef citations to date
0
Altmetric
Articles

Exquisite Analysis of Popular Machine Learning–Based Phishing Detection Techniques for Cyber Systems

, , , &

References

  • Kumaraguru, P., Rhee, Y., Sheng, S., Hasan, S., Acquisti, A., Cranor, L. F., & Hong, J. (2010). Teaching Johnny not to fall for Phish. ACM Transactions on Internet Technology, 10(2), 1–31. https://doi.org/10.1145/1754393.1754396
  • Afonso, J. A., Sousa, R. A., Ferreira, J. C., Monteiro, V., Pedrosa, D., Afonso, J. L. (2017). IoT system for anytime/anywhere monitoring and control of vehicles’ parameters [Paper presentation]. 2017 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), September 2017, pp. 193–198.
  • Aydin, M., Baykal, N. (2015). Feature extraction and classification phishing websites based on url [Paper presentation]. Proceeding of IEEE Conference on Communications and Network Security (CNS), September pp. 769–770.
  • Bhatt, P., & Thakker, B. (2020). A novel forecastive anomaly based botnet revelation framework for competing concerns in internet of things. Journal of Applied Security Research, 0(0), 1–21.
  • Che, H., Liu, Q., Zou, L., Yang, H., Zhou, D., and F. Yu. (2017). A content-based phishing email detection method [Paper presentation]. 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017, pp. 415–422. https://doi.org/10.1109/QRS-C.2017.75
  • Chiew, K. L., Yong, K. S. C., & Tan, C. L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106, 1–20. https://doi.org/10.1016/j.eswa.2018.03.050
  • Computational Complexity of Machine Learning Algorithm. (2018). https://www.thekerneltrip.com/machine/learning/computational-complexity-learning-algorithms/.
  • Computational Complexity of Training Neural Networks Using Back Propagation. (2018). https://ai.stackexchange.com/questions/5728/what-is-the-time-complexity-for-training-a-neural-network-using-back-propagation.
  • de Jesus Prado, K. H., Souza, L. S., D. de Jesus Junior, I., & Júnior, M. C. (2020). Applied intelligent data analysis to government data related to criminal incident: A systematic review. Journal of Applied Security Research, 15(3), 297–331.
  • Ding, Y., Luktarhan, N., Li, K., & Slamu, W. (2019). A keyword-based combination approach for detecting phishing webpages. Computers & Security, 84, 256–275. https://doi.org/10.1016/j.cose.2019.03.018
  • Dou, Z., Khalil, I., & Khreishah, A. (2017). CLAS: A novel communications latency based authentication scheme. Security and Communication Networks, 2017, 1–20. https://doi.org/10.1155/2017/4286903
  • Edith, J. J., & Chandrasekar, A. (2014). Layered architecture to detect attacks using asymmetric support vector machine. Journal of Applied Security Research, 9(2), 133–149. https://doi.org/10.1080/19361610.2014.883272
  • Feroz, M. N., & Mengel, S. (2014). Examination of data, rule generation and detection of phishing urls using online logistic regression [Paper presentation]. 2014 IEEE International Conference on Big Data (Big Data), October 2014, pp. 241–250. https://doi.org/10.1109/BigData.2014.7004239
  • Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74–81. https://doi.org/10.1145/2063176.2063197
  • Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing detection: A literature survey. IEEE Communications Surveys & Tutorials, 15(4), 2091–2121. https://doi.org/10.1109/SURV.2013.032213.00009
  • Kim, H., & Huh, J. H. (2011). Detecting DNS-poisoning-based phishing attacks from their network performance characteristics. Electronics Letters, 47(11), 656–658. https://doi.org/10.1049/el.2011.0399
  • Komatwar, R., & Kokare, M. (2020). A survey on malware detection and classification. Journal of Applied Security Research, 0(0), 1–31.
  • Liu, G., Qiu, B., Wenyin, L. (2010). Automatic detection of phishing target from phishing webpage [Paper presentation]. 20th International Conference on Pattern Recognition, Aug 2010, pp. 4153–4156.
  • Marchal, S., François, J., State, R., & Engel, T. (2014). Phishstorm: Detecting phishing with streaming analytics. IEEE Transactions on Network and Service Management, 11(4), 458–471. https://doi.org/10.1109/TNSM.2014.2377295
  • Marchal, S., Saari, K., Singh, N., & Asokan, N. (2016). Know your phish: Novel techniques for detecting phishing sites and their targets [Paper presentation]. 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), June 2016, pp. 323–333. https://doi.org/10.1109/ICDCS.2016.10
  • Moghimi, M., & Varjani, A. Y. (2016). New rule-based phishing detection method. Expert Systems with Applications, 53, 231–242. https://doi.org/10.1016/j.eswa.2016.01.028
  • Mohammad, R. M., Thabtah, F., & Mccluskey, L. (2014). Predicting phishing websites based on self-structuring neural network. Neural Computing and Applications, 25(2), 443–458. https://doi.org/10.1007/s00521-013-1490-z
  • PhishTank. (2020a). https://www.phishtank.com/.
  • Phishbank. (2020b). https://phishbank.org/.
  • Rao, R. S., & Pais, A. R. (2019). Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. Journal of Ambient Intelligence and Humanized Computing, 11, 1–20.
  • Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning based phishing detection from urls. Expert Systems with Applications, 117, 345–357. https://doi.org/10.1016/j.eswa.2018.09.029
  • Sentürk, S., Yerli, E., & Soukpnar, I. (2017). Email Phishing Detection and Prevention by Using Data Mining Techniques [Paper presentation]. Proceedings of International Conference on Computer Science and Engineering (UBMK), pp. 707–712.
  • Shi, J., & Saleem, S. (2012). Phishing. University of Arizona, Department of Computer Science, Tech. Rep.
  • Varshney, G., Misra, M., & Atrey, P. K. (2016). A survey and classification of web phishing detection schemes. Security and Communication Networks, 9(18), 6266–6284. https://doi.org/10.1002/sec.1674

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.