Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach

07/01/2020
by   J. Samantha Tharani, et al.
0

Phishing is a type of social engineering attack with an intention to steal user data, including login credentials and credit card numbers, leading to financial losses for both organisations and individuals. It occurs when an attacker, pretending as a trusted entity, lure a victim into click on a link or attachment in an email, or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks can be identified just by looking at URLs. Identifying the techniques which are used by phishers to mimic a phishing URL is rather a challenging issue. At present, we have limited knowledge and understanding of how cybercriminals attempt to mimic URLs with the same look and feel of the legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (Uniform Resource Locators), aiming to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an Information Gain (IG) and Chi-Squared feature selection methods in Machine Learning (ML) on a phishing dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January to May 2015 and from May to June 2017. Our results revealed that there were 10 techniques that phishers used to mimic URLs to manipulate humans into clicking links. Identifying these phishing URL manipulation techniques would certainly help to educate individuals and organisations and keep them safe from phishing attacks. In addition, the findings of this research will also help develop anti-phishing tools, framework or browser plugins for phishing prevention.

READ FULL TEXT

page 1

page 5

page 6

page 10

page 12

research
01/22/2020

Investigating Classification Techniques with Feature Selection For Intention Mining From Twitter Feed

In the last decade, social networks became most popular medium for commu...
research
12/07/2022

How Cyber Criminal Use Social Engineering To Target Organizations

Social engineering is described as the art of manipulation. Cybercrimina...
research
03/13/2019

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Phishing as one of the most well-known cybercrime activities is a decept...
research
07/13/2023

Identifying Early Help Referrals For Local Authorities With Machine Learning And Bias Analysis

Local authorities in England, such as Leicestershire County Council (LCC...
research
09/14/2023

Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats

Smishing, also known as SMS phishing, is a type of fraudulent communicat...
research
03/31/2023

Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

Social Honeypots are tools deployed in Online Social Networks (OSN) to a...
research
03/08/2022

Model-free feature selection to facilitate automatic discovery of divergent subgroups in tabular data

Data-centric AI encourages the need of cleaning and understanding of dat...

Please sign up or login with your details

Forgot password? Click here to reset