Skip to main content

Phishing Detection Method Based on Borderline-Smote Deep Belief Network

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

With the rapid development of Internet, phishing and other frauds are becoming more and more serious. Criminals posing as banks, electricity providers, social networking sites to send fraudulent information to induce users to log on, steal user information, so that the vast numbers of users and financial institutions suffered property and economic losses. How to accurately and effectively identify phishing related Internet risks has been a major concern of the Internet. This paper analyzes the development history of phishing prevention and control, and presents a Borderline-Smote (Synthetic Minority Over-sampling Technique) DBN (Deeping Belief Network) method to detect phishing. The method uses deep learning phishing detection method based on web documents content and other features to improve 1% on the recognition accuracy. Furthermore the paper uses Borderline-Smote to solve the imbalanced data problem in the training of phishing detection, and further improve 2% on the F-value and recall rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anti-Phishing Working Group [EB/OL]. http://www.antiphishing.org/

  2. Anti-Phishing Alliance of China [EB/OL]. http://apac.cn/gzdt/qwfb/201705/P020170522548444760778.pdf

  3. Anti-phishing Working Group. Phishing activity trends report [EB/OL] (2007). http://antiphishing.org/APWG_Report_March_2007.pdf

  4. Kang, J.M., Lee D.H.: Advanced white list approach for preventing access to phishing sites. In: 2007 International Conference on Convergence Information Technology, pp. 491–496. IEEE (2007)

    Google Scholar 

  5. Huang, H., Qian, L., Wang, Y.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(7), 921 (2012)

    Article  Google Scholar 

  6. Han, H., Wang, W.Y., Mao, B.H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. Adv. Intell. Comput. 878–887 (2005)

    Google Scholar 

  7. Chawla, N.V., Bowyer, K.W., Hall, L.O., et al.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)

    MATH  Google Scholar 

  8. Lakshmi, S.V., Vijaya, M.S.: The SVM based interactive tool for predicting phishing websites. Int. J. Comput. Sci. Inf. Secur. 9(10), 58 (2011)

    Google Scholar 

  9. Mohamed, A., Dahl, G., Hinton, G.: Deep belief networks for phone recognition. In: Nips Workshop on Deep Learning for Speech Recognition and Related Applications, vol. 1, no. 9, p. 39 (2009)

    Google Scholar 

  10. Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM Sigkdd Explor. Newslett. 6(1), 20–29 (2004)

    Article  Google Scholar 

  11. Provost, F.: Machine learning from imbalanced data sets 101. In: Proceedings of the AAAI 2000 Workshop on Imbalanced Data Sets, pp. 1–3 (2000)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Key Research and Development Program of China (No. 2016QY03D0605), the National Nature Science Foundation of China (Nos. 61672111, 61370069), and Beijing Natural Science Foundation (No. 4162043).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiahua Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Li, X. (2017). Phishing Detection Method Based on Borderline-Smote Deep Belief Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics