Evaluation of Features to Identify a Phishing Website Using Data Analysis Techniques

  • Amalanathan Geetha MaryEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 862)


With the growth in the present digital era, the Internet is the prime source of knowledge. This situation is depleted by phishers and they have drafted various websites which steals user’s information and misuse it. Though it is hard to locate a phishing site, various features of the phishing site helps in uncovering its mask. This paper discusses several features to identify a phishing site. Using data mining techniques like classification and association rule mining many explorations are performed to prove the notion. Similarly, the impact of various features considered for analysis is studied too.


Phishing site Legitimate site CART algorithm Classification Association rule mining 


  1. 1.
    M. Crawford, T.M. Khoshgoftaar, J.D. Prusa, A.N. Richter, Najada H. Al, Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 23 (2015)CrossRefGoogle Scholar
  2. 2.
    A. Abbasi, H. Chen, A comparison of tools for detecting fake websites. IEEE Comput. 42(10), 78–86 (2009)CrossRefGoogle Scholar
  3. 3.
    F.M. Zahedi, A. Abbasi, Y. Chen, Fake-website detection tools: identifying elements that promote individuals’ use and enhance their performance. J. Assoc. Inf. Syst. 16(6), 448 (2015)Google Scholar
  4. 4.
    R.M. Mohammad, L. McCluskey, F. Thabtah, Intelligent rule based phishing websites classification. IET Inf. Secur. 8(3), 153–160 (2014)CrossRefGoogle Scholar
  5. 5.
    A. Geetha Mary, D.P. Acharjya, N.Ch.S.N. Iyengar, Privacy preservation in fuzzy association rules using rough computing and DSR. Cybern. Inf. Technol. 14(1), 52–71 (2014)CrossRefGoogle Scholar
  6. 6.
    M.A. Geetha, D.P. Acharjya, N.Ch. Sriman Narayana Iyengar, Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR. Int. J. Auton. Adapt. Commun. Syst. 10(1), 67 (2017)CrossRefGoogle Scholar
  7. 7.
    M.A. Geetha, Fuzzy-based random perturbation for real world medical datasets. Int. J. Clin. Pract. Suppl. 1(2), 111 (2015)CrossRefGoogle Scholar
  8. 8.
    A. Geetha Mary, Privacy Preservation using Intelligent Techniques (LAP LAMBERT Academic Publishing, Germany, 2016), p. 176Google Scholar
  9. 9.
    R.M. Mohammad, L. McCluskey, F. Thabtah (University of California, School of Information and Computer Science, Irvine, CA, 2015),
  10. 10.
    R. Jabri, B. Ibrahim, Phishing websites detection using data mining classification model. Trans. Mach. Learn. Artif. Intell. 3(4), 42–51 (2015)Google Scholar
  11. 11.
    N. Abdelhamida, A. Ayesha, F. Thabtahb, Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948–5959 (2014)CrossRefGoogle Scholar
  12. 12.
    Y. Pan, X. Ding, Anomaly based web phishing page detection. Paper presented at 22nd computer security applications conference, IEEE Computer Society, Los Alamitos, CA, USA (2006)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringVellore Institute of TechnologyVelloreIndia

Personalised recommendations