Testing Phishing Detection Criteria and Methods

Phishing attacks have increased in the last years despite the use of anti-phishing filters. This is mainly caused by the diversity of phishers trials and the improvement on targeting potential victims on internet. Usually phishers employ social engineering techniques trying to convince users to supply confidential data using the email as the dissemination vehicle. Phishers disguise attacks as trustworthy organizations by cloning websites. According to international monitoring, phishing causes real injury mainly to banks and government institutions. This paper proposes important features to detect phishing attacks employing data mining techniques to evaluate and compare them. In this work we have used public corpora of phishing messages. As a main result we have identified main phishing detection criteria, which have been evaluated and best accurate results were achieved using neural nets and decision trees.

[1]  Musa A. Mammadov,et al.  Profiling Phishing Emails Based on Hyperlink Information , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[2]  K. Saravanan,et al.  An integrated approach to detect phishing mail attacks: a case study , 2009, SIN '09.

[3]  Weider D. Yu,et al.  PhishCatch - A Phishing Detection Tool , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[4]  Tony Bradley,et al.  Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security , 2006 .

[5]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[6]  Simon Brown,et al.  Detecting Phishing Emails Using Hybrid Features , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[7]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[8]  Lance James,et al.  Phishing exposed , 2005 .