Text and Data Mining to Detect Phishing Websites and Spam Emails

In this paper, we performed phishing and spam detection using textand data mining. For phishing websites detection, we extracted 17 features from the source code and URL of the websites and for spam-email detection we ap-plied text and data mining in tandem. In both studies, we achieved high sensi-tivity compared to previous studies and also provided decision rules.

[1]  Brian Whitworth,et al.  Spam and the social-technical gap , 2004, Computer.

[2]  Fadi A. Thabtah,et al.  Intelligent phishing detection system for e-banking using fuzzy data mining , 2010, Expert Syst. Appl..

[3]  Sureswaran Ramadass,et al.  Evolving Fuzzy Neural Network for Phishing Emails Detection , 2012 .

[4]  Andrew H. Sung,et al.  Detection of Phishing Attacks: A Machine Learning Approach , 2008, Soft Computing Applications in Industry.

[5]  Vadlamani Ravi,et al.  Detecting phishing e-mails using text and data mining , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[6]  Chih-Ping Wei,et al.  Effective spam filtering: A single-class learning and ensemble approach , 2008, Decis. Support Syst..

[7]  Xuhua Ding,et al.  Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[8]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[9]  Vangelis Metsis,et al.  Spam Filtering with Naive Bayes - Which Naive Bayes? , 2006, CEAS.

[10]  P. Oscar Boykin,et al.  Leveraging social networks to fight spam , 2005, Computer.

[11]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[12]  Fabio Roli,et al.  Spam Filtering Based On The Analysis Of Text Information Embedded Into Images , 2006, J. Mach. Learn. Res..

[13]  Bhanu Prasad Soft Computing Applications in Industry , 2008, Soft Computing Applications in Industry.

[14]  Fergus Toolan,et al.  Phishing detection using classifier ensembles , 2009, 2009 eCrime Researchers Summit.

[15]  Luis Mateus Rocha,et al.  Adaptive Spam Detection Inspired by the Immune System , 2008, ALIFE.

[16]  Tianshun Yao,et al.  An evaluation of statistical spam filtering techniques , 2004, TALIP.

[17]  M. S. Vijaya,et al.  Efficient prediction of phishing websites using supervised learning algorithms , 2012 .

[18]  Padraig Cunningham,et al.  A case-based technique for tracking concept drift in spam filtering , 2004, Knowl. Based Syst..

[19]  Md. Rafiqul Islam,et al.  A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..

[20]  Mingxing He,et al.  An efficient phishing webpage detector , 2011, Expert Syst. Appl..

[21]  Suku Nair,et al.  A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.

[22]  Amir Herzberg,et al.  TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks , 2004 .

[23]  C. van den Dool,et al.  When three is not a crowd: a Crossregulation Model of the dynamics and repertoire selection of regulatory CD4+ T cells , 2007, Immunological reviews.