Abstract
With the rapid development of Internet, phishing and other frauds are becoming more and more serious. Criminals posing as banks, electricity providers, social networking sites to send fraudulent information to induce users to log on, steal user information, so that the vast numbers of users and financial institutions suffered property and economic losses. How to accurately and effectively identify phishing related Internet risks has been a major concern of the Internet. This paper analyzes the development history of phishing prevention and control, and presents a Borderline-Smote (Synthetic Minority Over-sampling Technique) DBN (Deeping Belief Network) method to detect phishing. The method uses deep learning phishing detection method based on web documents content and other features to improve 1% on the recognition accuracy. Furthermore the paper uses Borderline-Smote to solve the imbalanced data problem in the training of phishing detection, and further improve 2% on the F-value and recall rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anti-Phishing Working Group [EB/OL]. http://www.antiphishing.org/
Anti-Phishing Alliance of China [EB/OL]. http://apac.cn/gzdt/qwfb/201705/P020170522548444760778.pdf
Anti-phishing Working Group. Phishing activity trends report [EB/OL] (2007). http://antiphishing.org/APWG_Report_March_2007.pdf
Kang, J.M., Lee D.H.: Advanced white list approach for preventing access to phishing sites. In: 2007 International Conference on Convergence Information Technology, pp. 491–496. IEEE (2007)
Huang, H., Qian, L., Wang, Y.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(7), 921 (2012)
Han, H., Wang, W.Y., Mao, B.H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. Adv. Intell. Comput. 878–887 (2005)
Chawla, N.V., Bowyer, K.W., Hall, L.O., et al.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
Lakshmi, S.V., Vijaya, M.S.: The SVM based interactive tool for predicting phishing websites. Int. J. Comput. Sci. Inf. Secur. 9(10), 58 (2011)
Mohamed, A., Dahl, G., Hinton, G.: Deep belief networks for phone recognition. In: Nips Workshop on Deep Learning for Speech Recognition and Related Applications, vol. 1, no. 9, p. 39 (2009)
Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM Sigkdd Explor. Newslett. 6(1), 20–29 (2004)
Provost, F.: Machine learning from imbalanced data sets 101. In: Proceedings of the AAAI 2000 Workshop on Imbalanced Data Sets, pp. 1–3 (2000)
Acknowledgments
This work is supported by the National Key Research and Development Program of China (No. 2016QY03D0605), the National Nature Science Foundation of China (Nos. 61672111, 61370069), and Beijing Natural Science Foundation (No. 4162043).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, J., Li, X. (2017). Phishing Detection Method Based on Borderline-Smote Deep Belief Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)