An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology

作者: Mohd. Mahmood Ali , Owais A.W. Siddiqui , Mohd. Nayeemuddin , Lakhsmi Rajamani

DOI: 10.1109/EESCO.2015.7253731

关键词:

摘要: Breaches in Cyber Security due to phishing messages is traced from instant which are sent through Social Networking Sites (SNS), these breaches lead disruptions network communication and theft of personal identifiable information (PII) that leads a plethora consequences like identity cyber fraud. To prevent issues, system developed using Ontology based Information Extraction technique (OBIE) Association rule mining (ARM) named as Anti Phishing Detection System (APDs) detect then predict the activity by maintaining continuously updated database consisting obtained previous attempts breach security; thus, intercept help secure user information. The experimental results APDs indicate significant achievement compared state-of-art systems.

参考文章(23)
Zhenhai Duan, Patrick Dwyer, MDMap: Assisting Users in Identifying Phishing Emails ,(2010)
Frank Reichartz, André Bergholz, Siehyun Strobel, Gerhard Paass, Jeong Ho Chang, Improved Phishing Detection using Model-Based Features. conference on email and anti-spam. ,(2008)
Zulfikar Ramzan, Candid Wueest, Phishing Attacks: Analyzing Trends in 2006. conference on email and anti-spam. ,(2007)
Eugene J. Koontz, Jonathan J. Oliver, Christine E. Drake, Anatomy of a Phishing Email. conference on email and anti-spam. ,(2004)
Aaron E. Kornblum, Searching For John Doe: Finding Spammers and Phishers. conference on email and anti-spam. ,(2005)
Diana K. Smetters, Paul Stewart, Breaking out of the Browser to Defend Against Phishing Attacks. conference on email and anti-spam. ,(2008)
Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham, A relational wrapper for RDF reification international conference on trust management. ,vol. 300, pp. 196- 214 ,(2009) , 10.1007/978-3-642-02056-8_13
Ramakrishnan Srikant, Rakesh Agrawal, Mining quantitative association rules in large relational tables international conference on management of data. ,vol. 25, pp. 1- 12 ,(1996) , 10.1145/233269.233311
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair, A comparison of machine learning techniques for phishing detection Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07. pp. 60- 69 ,(2007) , 10.1145/1299015.1299021
Andrew Jones Mahmoud Khonji, Youssef Iraqi, None, Phishing Detection: A Literature Survey IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 2091- 2121 ,(2013) , 10.1109/SURV.2013.032213.00009