PERFORMANCE ANALYSIS OF SELECTED MACHINE LEARNING ALGORITHMS IN THE DETECTION OF PHISHING ATTACKS ON VULNERABLE WEBSITES
DOI:
https://doi.org/10.15282/ijsecs.10.1.2024.7.0125Keywords:
Phishing attack, Machine learning, Algorithm, Cyber-attack, Classification, ModelsAbstract
Phishing is a cyber-attack where attackers pretend to be trustworthy, to trick individuals into providing sensitive information. Phishing also involves directing web users to fake websites that closely resemble legitimate ones and asking their victims to enter their personal information. It is imperative to restrict all forms of phishing websites or URLs. This study analyzes the performance of several machine-learning algorithms in creating models capable of detecting phishing websites. To achieve this central goal, massive phishing website detector datasets were retrieved from an online open repository, Kaggle. Relevant libraries in Python were explored for pre-processing, uploading, and partitioning of the datasets for training and testing the model. Models were created based on each of the six machine-learning algorithms implemented in this study. Evaluation of each model reveals that; Random Forest has the highest accuracy of 96.7%. followed by Support Vector Machine which records 96.4%. However, evaluating the model created using the Naive Bayes Classifier shows the lowest accuracy of 60.5%. This study has revealed the strength of each algorithm for detecting phishing websites; it also unveiled the procedures that need to be taken to mitigate and curb the spread of phishing attacks.
References
[1] A. Athulya and K. Praveen, "Towards the detection of phishing attacks," in 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184), 2020, pp. 337-343.
[2] K. Karimi and G. Atkinson, "What the Internet of Things (IoT) needs to become a reality," White Paper, FreeScale and ARM, pp. 1-16, 2013.
[3] K. Kimani, V. Oduol, and K. Langat, "Cyber security challenges for IoT-based smart grid networks," International journal of critical infrastructure protection, vol. 25, pp. 36-49, 2019.
[4] H. Ibrahim, "A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies," Wasit Journal of Computer and Mathematics Science, vol. 1, pp. 50-68, 2022.
[5] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, p. 1333, 2023.
[6] I. H. Sarker, H. Janicke, M. A. Ferrag, and A. Abuadbba, "Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures," Internet of Things, p. 101110, 2024.
[7] D. M. Cappelli, A. P. Moore, and R. F. Trzeciak, The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud): Addison-Wesley, 2012.
[8] I. Confente, G. G. Siciliano, B. Gaudenzi, and M. Eickhoff, "Effects of data breaches from user-generated content: A corporate reputation analysis," European Management Journal, vol. 37, pp. 492-504, 2019.
[9] A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, "A comprehensive survey of AI-enabled phishing attacks detection techniques," Telecommunication Systems, vol. 76, pp. 139-154, 2021.
[10] J. James, L. Sandhya, and C. Thomas, "Detection of phishing URLs using machine learning techniques," in 2013 international conference on control communication and computing (ICCC), 2013, pp. 304-309.
[11] C. Do Xuan, H. Thanh, and N. T. Lam, "Optimization of network traffic anomaly detection using machine learning," International Journal of Electrical & Computer Engineering (2088-8708), vol. 11, 2021.
[12] T. O. Ojewumi, G. Ogunleye, B. Oguntunde, O. Folorunsho, S. Fashoto, and N. Ogbu, "Performance evaluation of machine learning tools for detection of phishing attacks on web pages," Scientific African, vol. 16, p. e01165, 2022.
[13] F. Salahdine, Z. El Mrabet, and N. Kaabouch, "Phishing attacks detection a machine learning-based approach," in 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2021, pp. 0250-0255.
[14] G. Mohamed, J. Visumathi, M. Mahdal, J. Anand, and M. Elangovan, "An effective and secure mechanism for phishing attacks using a machine learning approach," Processes, vol. 10, p. 1356, 2022.
[15] A. Sadiq, M. Anwar, R. A. Butt, F. Masud, M. K. Shahzad, S. Naseem, et al., "A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0," Human behavior and emerging technologies, vol. 3, pp. 854-864, 2021.
[16] M. F. Ansari, P. K. Sharma, and B. Dash, "Prevention of phishing attacks using AI-based Cybersecurity Awareness Training," Prevention, vol. 3, 2022.
[17] M. Dadkhah, S. Shamshirband, and A. W. Abdul Wahab, "A hybrid approach for phishing website detection," The Electronic Library, vol. 34, pp. 927-944, 2016.
[18] M. Adil, R. Khan, and M. A. N. U. Ghani, "Preventive techniques of phishing attacks in networks," in 2020 3rd International Conference on Advancements in Computational Sciences (ICACS), 2020, pp. 1-8.
[19] Phishing website Detector. Available: Retrieved from: https://www.kaggle.com/datasets/eswarchandt/phishing-website-detector
[20] J. Seidu, A. Ewusi, JSY Kuma, YY Ziggah, and HJ Voigt, "Impact of data partitioning in groundwater level prediction using artificial neural network for multiple wells," International Journal of River Basin Management vol. 21 (4), 2023.
[21] M. O. Diaz Jr, "A domain-specific evaluation of the performance of selected web-based sentiment analysis platforms," International Journal of Software Engineering and Computer Systems, vol. 9, pp. 01-09, 2023.
[22] A. B. Shaik and S. Srinivasan, "A brief survey on random forest ensembles in classification model," in International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 2, 2019, pp. 253-260.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Fatima Enehezei Usman-Hamza, Adeleke Raheem Ajiboye
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.