2014
DOI: 10.1016/j.im.2014.08.003
|View full text |Cite
|
Sign up to set email alerts
|

A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(39 citation statements)
references
References 14 publications
0
39
0
Order By: Relevance
“…They suggested that 'request URL', 'age of domain' and 'HTTPS and SSL' are the most significant features, while 'Disabling Right Click' and '@ in the URL' are the lowest significant features. Actually, '@ in the URL' never attends in legitimate web pages, and some literatures took it as significant feature for phishing detection [8], [11], [21]. Basnet et al [22] investigated correlation-based feature selection (CFS) and wrapper feature selection (WFS) techniques for phishing web pages detection.…”
Section: Feature Engineering For Phishing Web Pages Detectionmentioning
confidence: 99%
“…They suggested that 'request URL', 'age of domain' and 'HTTPS and SSL' are the most significant features, while 'Disabling Right Click' and '@ in the URL' are the lowest significant features. Actually, '@ in the URL' never attends in legitimate web pages, and some literatures took it as significant feature for phishing detection [8], [11], [21]. Basnet et al [22] investigated correlation-based feature selection (CFS) and wrapper feature selection (WFS) techniques for phishing web pages detection.…”
Section: Feature Engineering For Phishing Web Pages Detectionmentioning
confidence: 99%
“…In CANTINA [8], it is a content-based approach to detect phishing, besides the URL and its domain name basically, CANTINA use TF-IDF algorithm to retrieve information, TF-IDF can measure how important a word in a document, and from their experiments result, it is good at detecting phishing, and using TF-IDF can reduce FP rate effectively. In [9], they proposed a method for e-Business websites phishing detection, it combined several features of business websites in Chinese, and use four classification algorithms to decide whether a phishing site. Besides, they consider that researchers should develop domain-specific methods which can detect phishing more useful.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, they varied in selecting the most contributing features such that classifiers caused variation on detection accuracies. Later, Zhang, Jiang, and Kim [27] developed automatic detection approach for Chinese e-business websites by incorporating the unique features extracted from URL and contents of website. Alongside, Hamid and Abawajy [28] proposed a multi-tier detector to phish emails filtering with the aid of Adaboost and SMO classifiers in an ensemble design.…”
Section: B Related Workmentioning
confidence: 99%
“…Such limitations include: the dependency of feature selection outcomes on a given dataset, different feature selection outcomes across different classification models, heterogeneity of features values, and un-scalable feature selection method to more challenging datasets [23][24][25][26][27][28]. Furthermore, most of the dedicated efforts focused on discarding the relevant features rather than the redundant ones during feature selection [23][24][25][26][27][28]. Besides, since they are mutually dependent on other features belonging to the same targeting class; the redundant features might distort the classification task and then degrade its accuracy by producing high error rates [29 and 30].…”
Section: Shortagesmentioning
confidence: 99%
See 1 more Smart Citation