RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web
V. Karamchand Gandhi1 , M. Suriakala2
- PG and Research Department of Computer Science, Dr Ambedkar Government Arts College (Autonomous), Chennai, India.
- PG and Research Department of Computer Science, Dr Ambedkar Government Arts College (Autonomous), Chennai, India.
Correspondence should be addressed to: vedhagandhi@gmail.com.
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-9 , Page no. 74-78, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.7478
Online published on Sep 30, 2017
Copyright © V. Karamchand Gandhi, M. Suriakala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: V. Karamchand Gandhi, M. Suriakala, “RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.74-78, 2017.
MLA Style Citation: V. Karamchand Gandhi, M. Suriakala "RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web." International Journal of Computer Sciences and Engineering 5.9 (2017): 74-78.
APA Style Citation: V. Karamchand Gandhi, M. Suriakala, (2017). RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web. International Journal of Computer Sciences and Engineering, 5(9), 74-78.
BibTex Style Citation:
@article{Gandhi_2017,
author = {V. Karamchand Gandhi, M. Suriakala},
title = {RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2017},
volume = {5},
Issue = {9},
month = {9},
year = {2017},
issn = {2347-2693},
pages = {74-78},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1433},
doi = {https://doi.org/10.26438/ijcse/v5i9.7478}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i9.7478}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1433
TI - RSIPS: A Robust System to Identify Phishing Websites using Unique Addressing features of Web
T2 - International Journal of Computer Sciences and Engineering
AU - V. Karamchand Gandhi, M. Suriakala
PY - 2017
DA - 2017/09/30
PB - IJCSE, Indore, INDIA
SP - 74-78
IS - 9
VL - 5
SN - 2347-2693
ER -
VIEWS | XML | |
843 | 501 downloads | 293 downloads |
Abstract
Phishing is a form of internet fraud in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users` confidential or sensitive credentials by imitating electronic communications from a trustworthy or from the public organization in an automated fashion. There is an need of identify the phishing websites in this emerging digital era. Based on the URL and content based features of websites like length of URL, domain’s age, WHOIS properties, etc, we can draw an algorithm to identify the phishing websites. Furthermore, our approach checks the legitimacy of a webpage using hyperlink features. Hyperlinks are extracted from the source code of the given website and apply that into the proposed algorithm to detect phishing site. Our experiment shows that our proposed algorithm is very effective to detect the phishing websites and it have 89.16% True Positive Rate while greater than 82% of accuracy.
Key-Words / Index Term
Phishing URL, Phishing URL/Hyperlink
References
[1] S. Abu-Nimeh and S. Nair, “Bypassing security toolbars and phishing filters via dns poisoning” In IEEE GLOBECOM: Global Telecommunications Conference, 2008.
[2] S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, “Who falls for phish? : a demographic analysis of phishing susceptibility and effectiveness of interventions” in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI ’10. New York, NY, USA: ACM, 2010, pp. 373–382.
[3]B. Krebs, “HBGary Federal hacked by Anonymous” http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011, accessed December 2011.
[4] V Karamchand Gandhi, “An Overview Study on Cyber crimes in Internet” Journal of Information Engineering and Applications from IISTE, Volume 2, Number 1, pages 1-5, February 2012. ISSN 2224-5782 (Paper) ISSN 2225-0506 (Online).
[5] Google safe browsing API Available at: https://developers.google.com/safe-browsing/. Accessed 30 Nov 2015.
[6] W Liu, X Deng, G Huang, AY Fu, “An antiphishing strategy based on visual similarity assessment”, IEEE Internet Comput. 10(2), 58–65 (2006)
[7] VP Reddy, V Radha, M Jindal, “Client side protection from phishing attack”, International Journal of advanced Engineering Science Technology 3(1), 039–045 (2011)
[8] A. Z. Broder, “Identifying and filtering near-duplicate documents”, In COM ’00: Proceedings of the 11th Annual Symposium on Combinatorial Pattern Matching, pages 1–10, London, UK, 2000. Springer-Verlag.