Please use this identifier to cite or link to this item:
http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Samantha Tharani, J. | - |
dc.contributor.author | Arachchilage, N.A.G. | - |
dc.date.accessioned | 2023-06-08T06:38:45Z | - |
dc.date.available | 2023-06-08T06:38:45Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540 | - |
dc.description.abstract | Phishing is a type of social engineering attack with an intention to steal user data, including login credentials and credit card numbers, leading to financial losses for both organizations and individuals. It occurs when an attacker, pretending as a trusted entity, lure a victim into click on a link or attachment in an email, or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks can be identified just by looking at uniform resource locator (URLs). Identifying the techniques which are used by phishers to mimic a phishing URL is rather a challenging issue. At present, we have limited knowledge and understanding of how cyber-criminals attempt to mimic URLs with the same look and feel of the legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (uniform resource locators), aiming to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an information gain (IG) and Chi-Squared feature selection methods in machine learning (ML) on a phishing dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January to May 2015 and from May to June 2017. Our results revealed that there were 10 techniques that phishers used to mimic URLs to manipulate humans into clicking links. Identifying these phishing URL manipulation techniques would certainly help to educate individuals and organizations and keep them safe from phishing attacks. In addition, the findings of this research will also help develop anti-phishing tools, framework or browser plugins for phishing prevention. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Research gate | en_US |
dc.subject | Feature selection | en_US |
dc.subject | Identity theft | en_US |
dc.subject | Information gain | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Phishing | en_US |
dc.title | Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach | en_US |
dc.type | Article | en_US |
dc.identifier.doi | DOI: 10.1002/spy2.120 | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Understanding phishers’ strategies of mimicking uniform.pdf | 2.82 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.