A hybrid firefly and support vector machine classifier for phishing email detection

作者: Oluyinka Aderemi Adewumi , Ayobami Andronicus Akinyelu

DOI: 10.1108/K-07-2014-0129

关键词: Firefly protocolClassifier (UML)Phishing detectionData miningFirefly algorithmIntelligent agentSupport vector machine classifierPhishingComputer scienceSupport vector machineControl and Systems EngineeringTheoretical computer scienceElectrical and Electronic EngineeringSoftwareArtificial intelligenceInformation Systems

摘要: Purpose – Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars has been lost by many companies and individuals. The global impact of phishing attacks will continue to be on the increase and thus a more efficient phishing detection technique is required. The purpose of this paper is to investigate and report the use of a nature inspired based-machine learning (ML) approach in classification of phishing e-mails. Design/methodology/approach – ML-based techniques have been shown to be efficient in detecting phishing attacks. In this paper, firefly algorithm (FFA) was integrated with support vector machine (SVM) with the primary aim of developing an improved phishing e-mail classifier (known as FFA_SVM), capable of accurately detecting new phishing patterns as they occur. From a data set consisting of 4,000 phishing and ham e-mails, a set of features, suitable for phishing e-mail detection, was extracted and used to construct the hybrid classifier. Findings – The FFA_SVM was applied to a data set consisting of up to 4,000 phishing and ham e-mails. Simulation experiments were performed to evaluate and compared the performance of the classifier. The tests yielded a classification accuracy of 99.94 percent, false positive rate of 0.06 percent and false negative rate of 0.04 percent. Originality/value – The hybrid algorithm has not been earlier apply, as in this work, to the classification and detection of phishing e-mail, to the best of the authors’ knowledge.

参考文章(34)
Asa Ben-Hur, Jason Weston, None, A User's Guide to Support Vector Machines Methods of Molecular Biology. ,vol. 609, pp. 223- 239 ,(2010) , 10.1007/978-1-60327-241-4_13
Frank Reichartz, André Bergholz, Siehyun Strobel, Gerhard Paass, Jeong Ho Chang, Improved Phishing Detection using Model-Based Features. conference on email and anti-spam. ,(2008)
Hameed, Evolving Fuzzy Neural Network for Phishing Emails Detection Journal of Computer Science. ,vol. 8, pp. 1099- 1107 ,(2012) , 10.3844/JCSSP.2012.1099.1107
John C. Mitchell, Neil Chou, Yuka Teraguchi, Robert Ledesma, Client-Side Defense Against Web-Based Identity Theft. network and distributed system security symposium. ,(2004)
Laura Auria, R. A. Moro, Support Vector Machines (SVM) as a Technique for Solvency Analysis SSRN Electronic Journal. ,(2008) , 10.2139/SSRN.1424949
Geoffrey M. Voelker, Chris Fleizach, Stefan Savage, David S. Anderson, Spamscatter: characterizing internet scam hosting infrastructure usenix security symposium. pp. 10- ,(2007)
Debra L. Cook, Vijay K. Gurbani, Michael Daniluk, Phishwish: A Stateless Phishing Filter Using Minimal Rules financial cryptography. pp. 182- 186 ,(2008) , 10.1007/978-3-540-85230-8_15
Mohammad Behdad, Luigi Barone, Mohammed Bennamoun, Tim French, Nature-Inspired Techniques in the Context of Fraud Detection systems man and cybernetics. ,vol. 42, pp. 1273- 1290 ,(2012) , 10.1109/TSMCC.2012.2215851