An assessment of features related to phishing websites using an automated technique

Rami M. Mohammad, Fadi Thabtah, Lee McCluskey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

170 Citations (Scopus)

Abstract

Corporations that offer online trading can achieve a competitive edge by serving worldwide clients. Nevertheless, online trading faces many obstacles such as the unsecured money orders. Phishing is considered a form of internet crime that is defined as the art of mimicking a website of an honest enterprise aiming to acquire confidential information such as usernames, passwords and social security number. There are some characteristics that distinguish phishing websites from legitimate ones such as long URL, IP address in URL, adding prefix and suffix to domain and request URL, etc. In this paper, we explore important features that are automatically extracted from websites using a new tool instead of relying on an experienced human in the extraction process and then judge on the features importance in deciding website legitimacy. Our research aims to develop a group of features that have been shown to be sound and effective in predicting phishing websites and to extract those features according to new scientific precise rules.

Original languageEnglish
Title of host publication2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012)
Subtitle of host publicationICITST 2012
PublisherIEEE
Pages492-497
Number of pages6
ISBN (Electronic)9781908320087
ISBN (Print)9781467353250
Publication statusPublished - 11 Mar 2013
Event7th International Conference for Internet Technology and Secured Transactions - London, United Kingdom
Duration: 10 Dec 201212 Dec 2012
Conference number: 7

Conference

Conference7th International Conference for Internet Technology and Secured Transactions
Abbreviated titleICITST 2012
Country/TerritoryUnited Kingdom
CityLondon
Period10/12/1212/12/12

Fingerprint

Dive into the research topics of 'An assessment of features related to phishing websites using an automated technique'. Together they form a unique fingerprint.

Cite this