skip to main content
10.1145/3650215.3650276acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcaConference Proceedingsconference-collections
research-article

An approach for detecting phishing websites by using search engine

Published: 16 April 2024 Publication History

Abstract

Among the massive information, there are many illegal elements who use the network to cheat users' trust and profit from it, and phishing websites are one of them. The address, content and layout of phishing websites are very similar to those of real websites, so netizens who have no security awareness are easily deceived and have serious consequences. With the increasing harm of phishing websites, how to judge whether a website is a phishing website has become a research hotspot. In order to detect whether a website is a phishing website, it is necessary to find out its real website, so we propose a new method. This method carries out TF-IDF analysis on the phishing to be detected, and extracts some words to represent the website. After the extracted phrases are input into different search engines, the output web pages are integrated and sorted, and the top ranked web pages are extracted to find out the fake objects of phishing websites to be detected. Experiments show that this method can effectively identify phishing websites.

References

[1]
Kathrine, 2019. Variants of phishing attacks and their detection techniques. Proceedings of the international Conference on Trends in Electronics and Informatics, ICOEI 2019, Icoei, pp. 255-259.
[2]
Y. Huang, Phishing url detection via cnn and attention-based hierarchical rnn, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, (2019) 112–119.
[3]
R. S. Rao, A. R. Pais, An enhanced blacklist method to detect phishing websites, in: International Conference on Information Systems Security, Springer, 2017, pp. 323–333.
[4]
M. Mohigimi, A.Y. Varjani, New rule-based phishing detection method, Expert Syst. Appl. 53, 2016, 231–242.
[5]
P. Yi, Web phishing detection using a deep learning framework, in: Wirel. Commun. Mob. Comput., 2018, Hindawi, 2018, pp. 1–9.
[6]
V. Muppavarapu, A. Rajendran, S. Vasudevan, Phishing detection using RDF and Random Forests, Int. Arab J. Inf. Technol. 2018, 817–824 September.
[7]
A. Mishra, B.B. Gupta, Intelligent phishing detection system using similarity matching algorithms, Int. J. Inf. Commun. Technol. 12 2018, 51–73.
[8]
Gupta, A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment. Computer Communications, 175, 47–57, 2021.
[9]
Ankit Kumar Jain, PhishSKaPe: A Content based Approach to Escape Phishing Attacks, Procedia Computer Science 171 2020, 1102–1109
[10]
R. Wille, Restructuring lattice theory: an approach based on hierarchies of concepts, in: I. Rival (Ed.), Ordered Sets, Reidel, Dordrecht, Boston, 1982, pp. 445-470.

Index Terms

  1. An approach for detecting phishing websites by using search engine

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMLCA '23: Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
    October 2023
    1065 pages
    ISBN:9798400709449
    DOI:10.1145/3650215
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 April 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICMLCA 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 16
      Total Downloads
    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media