Phishing Diagnosis: A Multi-Feature Decision Tree-based Method
Pravin Kumar Pandey1, Sandip Kumar Singh2
1Pravin Kumar Pandey Department of Computer Science & Engineering, UNSIET, VBS Purvanchal University, Jaunpur, UP.
2Sandip Kumar Singh Department of Mechanical Engineering, UNSIET, VBS Purvanchal University, Jaunpur, UP.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 4353-4359 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B2321129219/2019©BEIESP | DOI: 10.35940/ijeat.B2321.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Phishing is an electronically connected criminal activity in which the attacker steals the user’s personal information like username, countersign, internet banking account, credit/debit card number with the expiration date, password, pin, legitimacy, confidential patient record, CVV number, etc. to boon financially. Email-based phishing is the most common and traditional way of phishing scams, in which the phisher will send a suspicious email with an embedded URL and ask the user to click the URL. When the user clicks on the link, the link will be redirected to a spoofed site that looks the same to the original site to steal their credentials and displays some error message. Later the phishing uses those credentials for malicious purposes. To overcome these scams, many anti-phishing tools have developed. Among that the machine learning-based approaches can give a better result. This paper is an extensive study of the various machine learning-based anti-phishing approaches and their results that detect the phishing URL’s from the URLs with URLs features. Six most important models of machine learning have been examined for the phishing detection problem. The Decision Tree-based method outperforms other methods.
Keywords: Phishing, Anti-phishing, Machine learning, Phish tank, Legitimate, Suspicious, Decision Tree.