Skip to main content

An Intelligent Phishing Detection Scheme Using Machine Learning

  • Conference paper
  • First Online:
Proceedings of the Sixth International Conference on Mathematics and Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1262))

Abstract

In today’s era, the world is moving toward automation, in which objects connected to Internet can take independent decisions. In such an environment, machine learning which is an integral part of artificial intelligence, is used widely to design algorithms based on the data trends and historical relationships between data. However, security and privacy preservation in such an environment are key challenges in front of the research communities to handle. Hence, in this paper we present a framework which detects the phishing websites using machine learning. The proposed framework implements ten machine learning models and the best three models are ensembled followed by ten rounds of cross-validation. The overall performance of the proposed framework resulted an accuracy of 97.27% which is better than the existing proposals in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barbash GI (2010) New technology and health care costs-the case of robot-assisted surgery. The New Engl J Medi 363(8):701

    Article  Google Scholar 

  2. Brady M (1985) Artificial intelligence and robotics. Artif Intell 26(1):79–121

    Google Scholar 

  3. Burgio LD, Allen-Burge R, Roth DL, Bourgeois MS, Dijkstra K, Gerstle J, Jackson E, Bankester L (2001) Come talk with me: Improving communication between nursing assistants and nursing home residents during care routines. The Gerontologist 41(4):449–460

    Article  Google Scholar 

  4. Erickson T, Danis CM, Kellogg WA, Helander ME (2008) Assistance: the work practices of human administrative assistants and their implications for it and organizations. In: Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp 609–618

    Google Scholar 

  5. EY (2019 (accessed April 21, 2019)) Report by ey.com. https://www.ey.com/Publication/vwLUAssets/EY-global-information-security-survey-2014/FILE/EY-global-information-security-survey-2014.pdf

  6. F5 (2019 (accessed April 20, 2019)) Report by f5 labs. https://www.darkreading.com/attacks-breaches/new-report-iot-now-top-internet-attack-target/d/d-id/1333147

  7. Forbes (2019 (accessed October 11, 2019)) Artificial intelligence examples. https://www.forbes.com/sites/bernardmarr/2018/04/30/27-incredible-examples-of-ai-and-machine-learning-in-practice/#67c9eb217502

  8. Fortune (2019 (accessed October 11, 2019)) Artificial intelligence could be a boon to the global economy. https://fortune.com/2019/10/09/artificial-intelligence-14-trillion-boon-only-if-overcome-one-thing/

  9. HP (2019 (accessed April 20, 2019)) Internet of things devices. https://www8.hp.com/us/en/hp-news/press-release.html?id=1744676

  10. Jiang F, Jiang Y, Zhi H, Dong Y, Li H, Ma S, Wang Y, Dong Q, Shen H, Wang Y (2017) Artificial intelligence in healthcare: past, present and future. Stroke Vasc Neurol 2(4):230–243

    Article  Google Scholar 

  11. Kausar F, Al-Otaibi B, Al-Qadi A, Al-Dossari N (2014) Hybrid client side phishing websites detection approach. Int J Adv Comput Sci Appl (IJACSA) 5(7):132–140

    Google Scholar 

  12. Kruegel C, Vigna G (2003) Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM conference on computer and communications security, ACM, pp 251–261

    Google Scholar 

  13. Makkar A, Kumar N (2019) Cognitive spammer: a framework for pagerank analysis with split by over-sampling and train by under-fitting. Future Gener Comput Syst 90:381–404

    Article  Google Scholar 

  14. Mohammad RM, Thabtah F, McCluskey L (2015) Phishing websites features. University of Huddersfield, School of Computing and Engineering

    Google Scholar 

  15. Schorr H, Rappaport A (1989) Innovative applications of artificial intelligence. Cambridge, MA, MIT Press, , 379 p (For individual items see A90-32502 to A90-32504)

    Google Scholar 

  16. Sigmoidal (2019 (accessed October 11, 2019)) Artificial intelligence in healthcare. https://sigmoidal.io/artificial-intelligence-and-machine-learning-for-healthcare/#targetText=Artificial

  17. Times E (2019 (accessed April 20, 2019)) Report by economic times. https://telecom.economictimes.indiatimes.com/news/iot-devices-malware-grew-73-in-q3-2018-report/67171649

  18. Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000

    Google Scholar 

  19. Zeng D, Chen H, Lusch R, Li SH (2010) Social media analytics and intelligence. IEEE Intell Syst 25(6):13–16

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aaisha Makkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Makkar, A., Kumar, N., Sama, L., Mishra, S., Samdani, Y. (2021). An Intelligent Phishing Detection Scheme Using Machine Learning. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1262. Springer, Singapore. https://doi.org/10.1007/978-981-15-8061-1_13

Download citation

Publish with us

Policies and ethics