Identification of phishing websites through hyperlink analysis and rule extraction

Chaoqun Wang, Zhongyi Hu*, Raymond Chiong, Yukun Bao, Jiang Wu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Purpose: The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of phishing websites and identify them accurately. Design/methodology/approach: Hyperlink indicators along with URL-based features are used to build the identification model. In the proposed approach, very simple rules are first extracted based on individual features to provide meaningful and easy-to-understand rules. Then, the F-measure score is used to select high-quality rules for identifying phishing websites. To construct a reliable and promising phishing website identification model, the selected rules are integrated using a simple neural network model. Findings: Experiments conducted using self-collected and benchmark data sets show that the proposed approach outperforms 16 commonly used classifiers (including seven non–rule-based and four rule-based classifiers as well as five deep learning models) in terms of interpretability and identification performance. Originality/value: Investigating patterns of phishing websites based on hyperlink indicators using the efficient rule-based approach is innovative. It is not only helpful for identifying phishing websites, but also beneficial for extracting simple and understandable rules.

Original languageEnglish
Pages (from-to)1073-1093
Number of pages21
JournalElectronic Library
Volume38
Issue number5-6
DOIs
Publication statusPublished - 12 Dec 2020
Externally publishedYes

Keywords

  • Classification
  • Hyperlink analysis
  • Neural networks
  • Phishing websites
  • Rule extraction

Fingerprint

Dive into the research topics of 'Identification of phishing websites through hyperlink analysis and rule extraction'. Together they form a unique fingerprint.

Cite this