A lightweight and proactive rule-based incremental construction approach to detect phishing scam
M. SatheeshKumar (),
K. G. Srinivasagan () and
G. UnniKrishnan ()
Additional contact information
M. SatheeshKumar: National Engineering College
K. G. Srinivasagan: National Engineering College
G. UnniKrishnan: Mindtree
Information Technology and Management, 2022, vol. 23, issue 4, No 3, 298 pages
Abstract:
Abstract The development of digitization over the globe has made digital security inescapable. As every single article on this planet is being digitalized quickly, it is more important to protect those items. Numerous cyber threats effectively deceive ordinary individuals to take away their identifications. Phishing is a kind of social engineering attack where the hackers are using this kind of attack in modern days to steal the user's credentials. After a systematic research analysis of phishing technique and email scam, an intrusion detection system in chrome extension is developed. This technique is used to detect real-time phishing by examining the URL, domain, content and page attributes of an URL prevailing in an email and any web page portion. Considering the reliability, robustness and scalability of an efficient phishing detection system, we designed a lightweight and proactive rule-based incremental construction approach to detect any unknown phishing URLs. Due to the computational intelligence and nondependent of the blacklist signatures, this application can detect the zero-day and spear phishing attacks with a detection rate of 89.12% and 76.2%, respectively. The true positive values acquired in our method is 97.13% and it shows less than 1.5% of false positive values. Thus the application shows the precision level higher than the previous model developed and other phishing techniques. The overall results indicate that our framework outperforms the existing method in identifying phishing URLs.
Keywords: Phishing URL; Email scam; Spear phishing; Zero-day attack; Browser extension; Heuristic intrusion detection system (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s10799-021-00351-7 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infotm:v:23:y:2022:i:4:d:10.1007_s10799-021-00351-7
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10799
DOI: 10.1007/s10799-021-00351-7
Access Statistics for this article
Information Technology and Management is currently edited by Raymond Patterson and Erik Rolland
More articles in Information Technology and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().