An approach for profiling phishing activities

Hamid, Isreda Rahmi A and Abawajy, Jemal H 2014, An approach for profiling phishing activities, Computers and security, vol. 45, pp. 27-41, doi: 10.1016/j.cose.2014.04.002.

Attached Files
Name Description MIMEType Size Downloads

Title An approach for profiling phishing activities
Author(s) Hamid, Isreda Rahmi A
Abawajy, Jemal HORCID iD for Abawajy, Jemal H orcid.org/0000-0001-8962-1222
Journal name Computers and security
Volume number 45
Start page 27
End page 41
Total pages 15
Publisher Elsevier
Place of publication Kidlington, England
Publication date 2014-09
ISSN 0167-4048
1872-6208
Keyword(s) Clustering
Cybersecurity
Information security
Network security
Phishing email
Profiling
Science & Technology
Technology
Computer Science, Information Systems
Computer Science
Summary Phishing attacks continue unabated to plague Internet users and trick them into providing personal and confidential information to phishers. In this paper, an approach for email-born phishing detection based on profiling and clustering techniques is proposed. We formulate the profiling problem as a clustering problem using various features present in the phishing emails as feature vectors and generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of the emails. We carried out extensive experimental analysis of the proposed approach in order to evaluate its effectiveness to various factors such as sensitivity to the type of data, number of data sizes and cluster sizes. We compared the performance of the proposed approach against the Modified Global Kmeans (MGKmeans) approach. The results show that the proposed approach is efficient as compared to the baseline approach. © 2014 Elsevier Ltd. All rights reserved.
Language eng
DOI 10.1016/j.cose.2014.04.002
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2014, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30069148

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 7 times in TR Web of Science
Scopus Citation Count Cited 11 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 288 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Wed, 21 Jan 2015, 10:53:45 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.