Using feature selection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmi A., Abawajy, Jemal and Kim, Tai-hoon 2013, Using feature selection and classification scheme for automating phishing email detection, Studies in informatics and control, vol. 22, no. 1, pp. 61-70.

Attached Files
Name Description MIMEType Size Downloads

Title Using feature selection and classification scheme for automating phishing email detection
Author(s) Hamid, Isredza Rahmi A.
Abawajy, Jemal
Kim, Tai-hoon
Journal name Studies in informatics and control
Volume number 22
Issue number 1
Start page 61
End page 70
Total pages 10
Publisher ICI Bucharest
Place of publication Bucharest, Romania
Publication date 2013
ISSN 1220-1766
Keyword(s) internet security
behaviour-based
feature selection
phishing
Summary Email has become the critical communication medium for most organizations. Unfortunately, email-born attacks in computer networks are causing considerable economic losses worldwide. Exiting phishing email blocking appliances have little effect in weeding out the vast majority of phishing emails. At the same time, online criminals are becoming more dangerous and sophisticated. Phishing emails are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. In this paper, we propose a hybrid feature selection approach based combination of content-based and behaviour-based. The approach could mine the attacker behaviour based on email header. On a publicly available test corpus, our hybrid features selection is able to achieve 94% accuracy rate.
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2013, ICI Bucharest
Persistent URL http://hdl.handle.net/10536/DRO/DU:30057697

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Link to Related Work
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 5 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 51 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Tue, 12 Nov 2013, 14:07:07 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.