Speeding up Anti-Phishing Tools Development using Self-Structuring Neural Network

Internet has become an essential component of our everyday social and financial activities. However, internetusers may be vulnerable to different types of web-threats. Phishing is considered as a form of web-threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain confidential information such as usernames, passwords and social security number. To date, there is no single solution that can capture every phishing attack. In this article, we proposed an intelligent model for predicting phishing attacks based on Artificial Neural Network “ANN” particularly, selfstructuring neural networks. Phishing is a continuous problem where features significant in determining the type of webpages are constantly changing. Thus, we need to regularly retrain the anti-phishing tool to cope with these changes. Our model speeds up the anti-phishing tool development by automating the process of structuring an ANN model. Our model shows high acceptance for noisy data, fault tolerance and high prediction accuracy. Several experiments were conducted in our research, the number of epochs differ in each experiment. From the results, we find that all produced structures have high generalization ability. KeywordsWeb Threat, Phishing, Anti-Phishing, Neural Network, Data Mining.

[1]  Mehmed Kantardzic,et al.  Data-Mining Concepts , 2011 .

[2]  R. G. Hutchins Neural network topologies and training algorithms in nonlinear system identification , 1995, 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century.

[3]  Fadi A. Thabtah,et al.  Intelligent phishing detection system for e-banking using fuzzy data mining , 2010, Expert Syst. Appl..

[4]  Alex Berson,et al.  Building Data Mining Applications for CRM , 1999 .

[5]  Lorrie Faith Cranor,et al.  A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.

[6]  Hinrich Schütze,et al.  Introduction to information retrieval , 2008 .

[7]  Arnon Rungsawang,et al.  Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.

[8]  Carolyn Penstein Rosé,et al.  CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.

[9]  Bernard Widrow,et al.  30 years of adaptive neural networks: perceptron, Madaline, and backpropagation , 1990, Proc. IEEE.

[10]  Peter I. Cowling,et al.  MCAR: multi-class classification based on association rule , 2005, The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005..

[11]  Wynne Hsu,et al.  Integrating Classification and Association Rule Mining , 1998, KDD.

[12]  Xiaotie Deng,et al.  An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.

[13]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[14]  Daisuke Miyamoto,et al.  An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.

[15]  J. Ross Quinlan,et al.  Improved Use of Continuous Attributes in C4.5 , 1996, J. Artif. Intell. Res..

[16]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[17]  Jadzia Cendrowska,et al.  PRISM: An Algorithm for Inducing Modular Rules , 1987, Int. J. Man Mach. Stud..

[18]  Ashok N. Srivastava,et al.  Data Mining: Concepts, Models, Methods, and Algorithms , 2005, J. Comput. Inf. Sci. Eng..

[19]  Mingxing He,et al.  An efficient phishing webpage detector , 2011, Expert Syst. Appl..

[20]  D. Edwards Data Mining: Concepts, Models, Methods, and Algorithms , 2003 .

[21]  Xuhua Ding,et al.  Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[22]  Jacek M. Zurada,et al.  Introduction to artificial neural systems , 1992 .

[23]  Albert Y. Zomaya,et al.  Toward generating neural network structures for function approximation , 1994, Neural Networks.

[24]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[25]  Rami Mohammad Phishing Websites Datast , 2015 .

[26]  I A Basheer,et al.  Artificial neural networks: fundamentals, computing, design, and application. , 2000, Journal of microbiological methods.

[27]  Yiming Ye,et al.  Introduction to E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand , 2001, E-Commerce Agents.

[28]  T. L. McCluskey,et al.  An assessment of features related to phishing websites using an automated technique , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[29]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[30]  Fadi A. Thabtah,et al.  Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[31]  A. S. Sodiya,et al.  Threat Modeling Using Fuzzy Logic Paradigm , 2007 .

[32]  Marcel Abendroth,et al.  Data Mining Practical Machine Learning Tools And Techniques With Java Implementations , 2016 .