An approach for profiling phishing activities
Version 2 2024-06-03, 11:53Version 2 2024-06-03, 11:53
Version 1 2015-01-20, 17:19Version 1 2015-01-20, 17:19
journal contribution
posted on 2024-06-03, 11:53 authored by IRA Hamid, Jemal AbawajyJemal AbawajyPhishing attacks continue unabated to plague Internet users and trick them into providing personal and confidential information to phishers. In this paper, an approach for email-born phishing detection based on profiling and clustering techniques is proposed. We formulate the profiling problem as a clustering problem using various features present in the phishing emails as feature vectors and generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of the emails. We carried out extensive experimental analysis of the proposed approach in order to evaluate its effectiveness to various factors such as sensitivity to the type of data, number of data sizes and cluster sizes. We compared the performance of the proposed approach against the Modified Global Kmeans (MGKmeans) approach. The results show that the proposed approach is efficient as compared to the baseline approach. © 2014 Elsevier Ltd. All rights reserved.
History
Journal
Computers and securityVolume
45Pagination
27-41Location
Kidlington, EnglandPublisher DOI
ISSN
0167-4048eISSN
1872-6208Language
engPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2014, ElsevierPublisher
ElsevierUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC