A hybrid firefly and support vector machine classifier for phishing email detection
Author:
Adewumi Oluyinka Aderemi,Akinyelu Ayobami Andronicus
Abstract
Purpose
– Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars has been lost by many companies and individuals. The global impact of phishing attacks will continue to be on the increase and thus a more efficient phishing detection technique is required. The purpose of this paper is to investigate and report the use of a nature inspired based-machine learning (ML) approach in classification of phishing e-mails.
Design/methodology/approach
– ML-based techniques have been shown to be efficient in detecting phishing attacks. In this paper, firefly algorithm (FFA) was integrated with support vector machine (SVM) with the primary aim of developing an improved phishing e-mail classifier (known as FFA_SVM), capable of accurately detecting new phishing patterns as they occur. From a data set consisting of 4,000 phishing and ham e-mails, a set of features, suitable for phishing e-mail detection, was extracted and used to construct the hybrid classifier.
Findings
– The FFA_SVM was applied to a data set consisting of up to 4,000 phishing and ham e-mails. Simulation experiments were performed to evaluate and compared the performance of the classifier. The tests yielded a classification accuracy of 99.94 percent, false positive rate of 0.06 percent and false negative rate of 0.04 percent.
Originality/value
– The hybrid algorithm has not been earlier apply, as in this work, to the classification and detection of phishing e-mail, to the best of the authors’ knowledge.
Subject
Computer Science (miscellaneous),Social Sciences (miscellaneous),Theoretical Computer Science,Control and Systems Engineering,Engineering (miscellaneous)
Reference46 articles.
1. Akinyelu, A.A.
and
Adewumi, A.O.
(2014), “Classification of phishing email using random forest machine learning technique”,
Journal of Applied Mathematics
, Vol. 2014, 6pp. 2. Al-Mo, A.A.D.
,
Wan, T.-C.
,
Al-Saedi, K.
,
Altaher, A.
,
Ramadass, S.
,
Manasrah, A.
,
Melhiml, L.B.
and
Anbar, M.
(2011), “An online model on evolving phishing e-mail detection and classification method”,
Journal of Applied Sciences
, Vol. 11 No. 18, pp. 3301-3307. 3. Almomani, A.
,
Wan, T.-C.
,
Altaher, A.
,
Manasrah, A.
,
Almomani, E.
,
Anbar, M.
,
Alomari, E.
and
Ramadass, S.
(2012), “Evolving fuzzy neural network for phishing emails detection”,
Journal of Computer Science
, Vol. 8 No. 7, pp. 1099-1107. 4. Anderson, D.S.
,
Fleizach, C.
,
Savage, S.
and
Voelker, G.M.
(2007), “Spamscatter: characterizing internet scam hosting infrastructure”, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Boston, MA, pp. 1-14. 5. APWG
(2013), “Phishing activity trends report”, available at: http://docs.apwg.org/reports/apwg_trends_report_q3_2013.pdf (accessed April 5, 2016).
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|