Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
A SVM-based Technique to Detect Phishing URLs

Huajun Huang, Liang Qian and Yaojun Wang

Information Technology Journal, 2012, 11(7), 921-925.


Phishing, a term coined in 1996, is a form of online identity theft. Phisher tries to lure her victim into clicking a phishing URL pointing to a spoof page via spam-email to harvest financial information. The phishing activity is on the rise and their techniques become easier and more sophisticated. Quite a number of solutions to mitigate phishing attacks have been proposed to date. Those methods fetch webpage content which result in undesired side effects. In this paper, a novel method is proposed to detect phishing URL based on SVM. The feature vector is constructed with 23 features to model the SVM which 4 features are the structure feature of the phishing URL, 9 features are lexical feature and 10 features are mostly target phished brand name of website. The experimental results show the detection solution achieves 99.0% accuracy on average that the phishing URLs achieve is downloaded in PhishTank.

ASCI-ID: 28-1627

Cited References Fulltext

Related Articles

Robust Description Method of SIFT for Features of License Plate Characters

Information Technology Journal, 2011, 10(11), 2189-2195.

An Active Anti-phishing Solution Based on Semi-fragile Watermark

Information Technology Journal, 2013, 12(1), 198-203.

Least Squares Support Vector Machine on Morlet Wavelet Kernel Function and its Application to Nonlinear System Identification

Information Technology Journal, 2006, 5(3), 439-444.

Machine Learning Technique Approaches in Drug Discovery, Design and Development

Information Technology Journal, 2007, 6(5), 718-724.

The Comparisons of Personal Credit Evaluation Models

Information Technology Journal, 2011, 10(11), 2237-2241.

Support Vector Machine Based Classification of Clicked Document Using Topic Ontology for Profile Generation

Information Technology Journal, 2012, 11(8), 1007-1015.

Localization of Wireless Sensor Networks with a Mobile Beacon

Information Technology Journal, 2013, 12(11), 2251-2255.

Research on the Adaptive Prediction Model for Drilling Accidents Based on PSO-SVM

Information Technology Journal, 2013, 12(14), 2635-2640.

Railway Simply Supported Steel Truss Bridge Damage Identification Based on Deflection

Information Technology Journal, 2013, 12(17), 3946-3951.

Study on Nonlinear Combination Forecasting Model for Grain Yield

Information Technology Journal, 2013, 12(18), 4666-4672.

Week-ahead Price Forecasting of Computer Accessories Based on BP and SVM

Information Technology Journal, 2013, 12(19), 4937-4945.

Man-made Object Detection Based on Latent Dirichlet Allocation

Information Technology Journal, 2013, 12(21), 6258-6262.

Determination of Water Content in De-enzyming Green Tea Leaves Based on Hyper-spectral Imaging

Information Technology Journal, 2013, 12(22), 6729-6734.

Algorithm of Head Detection and Tracking Based on Adaboost and Improved Resampling for Particle Filter

Information Technology Journal, 2013, 12(23), 7124-7130.

A New Nonlinear Combination Forecasting Algorithm and its Application in Digital Mine

Information Technology Journal, 2013, 12(24), 8066-8073.

Partial Fingerprint Recognition Using Support Vector Machine

Information Technology Journal, 2010, 9(4), 844-848.

Cited By

New Rule-Based Phishing Detection Method

Expert Systems with Applications, 2016, (), . DOI: 10.1016/j.eswa.2016.01.028

Evaluation of the physicochemical and chlorophyll-a conditions of a subtropical aquaculture in Lake Nasser area, Egypt

Beni-Suef University Journal of Basic and Applied Sciences, 2015, 4(4), 327. DOI: 10.1016/j.bjbas.2015.11.009

Assessment of acute and subacute toxic effects of the Saudi folk herb Retama raetam in rats

Journal of the Chinese Medical Association, 2015, 78(12), 691. DOI: 10.1016/j.jcma.2015.06.011

Evaluation of phenolic compound, antioxidant activities and antioxidant enzymes of barberry genotypes in Iran

Scientia Horticulturae, 2016, 200(), 125. DOI: 10.1016/j.scienta.2016.01.015

Treatment modalities for tuberculosis of the spine: 22 years' experience in east Taiwan

Formosan Journal of Surgery, 2013, 46(6), 189. DOI: 10.1016/j.fjs.2013.06.005

Protein enrichment and digestion improvement of napiergrass and pangolagrass with solid-state fermentation

Journal of Microbiology, Immunology and Infection, 2013, 46(3), 171. DOI: 10.1016/j.jmii.2012.04.001

Polyporus squamosus (Huds.) Fr from different origins: Chemical characterization, screening of the bioactive properties and specific antimicrobial effects against Pseudomonas aeruginosa

LWT - Food Science and Technology, 2016, 69(), 91. DOI: 10.1016/j.lwt.2016.01.037

Chronic arsenic exposure and its adverse health effects in Taiwan: A paradigm for management of a global environmental problem

The Kaohsiung Journal of Medical Sciences, 2011, 27(9), 411. DOI: 10.1016/j.kjms.2011.05.009

Bacterial colonization of double J stents and bacteriuria frequency

The Kaohsiung Journal of Medical Sciences, 2013, 29(12), 658. DOI: 10.1016/j.kjms.2013.01.017

Potential of D-cycloserine in the treatment of behavioral and neuroinflammatory disorders in Parkinson's disease and studies that need to be performed before clinical trials

The Kaohsiung Journal of Medical Sciences, 2012, 28(8), 407. DOI: 10.1016/j.kjms.2012.02.010

Effect of luteolin on lipid peroxidation and antioxidants in acute and chronic periods of isoproterenol induced myocardial infarction in rats

Journal of Acute Medicine, 2012, 2(3), 70. DOI: 10.1016/j.jacme.2012.06.001

Ocular inserts based on chitosan and brimonidine tartrate: Development, characterization and biocompatibility

Journal of Drug Delivery Science and Technology, 2016, 32(), 21. DOI: 10.1016/j.jddst.2016.01.008

Solar photovoltaic water pumping system - A comprehensive review

Renewable and Sustainable Energy Reviews, 2016, 59(), 1038. DOI: 10.1016/j.rser.2016.01.021

A review on paddy residue based power generation: Energy, environment and economic perspective

Renewable and Sustainable Energy Reviews, 2016, 59(), 1089. DOI: 10.1016/j.rser.2016.01.038

Effect of 70% ethanolic extract of roots of Paeonia officinalis Linn. on hepatotoxicity

Journal of Acute Medicine, 2013, 3(2), 45. DOI: 10.1016/j.jacme.2013.04.001

Reclaiming salt-affected soils using electro-remediation technology: PCPSS evaluation

Electrochimica Acta, 2016, 190(), 511. DOI: 10.1016/j.electacta.2016.01.036

Microbiology of neonatal septicemia in a tertiary hospital in Benin City, Nigeria

Biomarkers and Genomic Medicine, 2013, 5(4), 142. DOI: 10.1016/j.bgm.2013.06.001

Antibacterial activity of seed extracts of Callistemon lanceolatus DC on uropathogenic bacteria

Journal of Acute Medicine, 2014, 4(1), 6. DOI: 10.1016/j.jacme.2013.12.001

Renoprotective effect of Tabernaemontana heyneana Wall. leaves against paracetamol-induced renotoxicity in rats and detection of polyphenols by high-performance liquid chromatography–diode array detector–mass spectrometry analysis

Journal of Acute Medicine, 2014, 4(2), 57. DOI: 10.1016/j.jacme.2014.02.002

3D printing in pharmaceutics: A new tool for designing customized drug delivery systems

International Journal of Pharmaceutics, 2016, 499(1-2), 376. DOI: 10.1016/j.ijpharm.2015.12.071

Preparation of chitosan/polycaprolactam nanofibrous filter paper and its greatly enhanced chromium(VI) adsorption

Colloids and Surfaces A: Physicochemical and Engineering Aspects, 2016, 494(), 65. DOI: 10.1016/j.colsurfa.2016.01.021

Fabrication and efficacy evaluation of chloroquine nanoparticles in CFA-induced arthritic rats using TNF-α ELISA

European Journal of Pharmaceutical Sciences, 2016, 84(), 1. DOI: 10.1016/j.ejps.2016.01.009

Improved thermal energy discharge rate from a temperature-controlled heating source in a natural draft chimney

Applied Thermal Engineering, 2016, 98(), 991. DOI: 10.1016/j.applthermaleng.2015.12.098

Optimization Approaches for Designing Quantum Reversible Arithmetic Logic Unit

International Journal of Theoretical Physics, 2016, 55(3), 1423. DOI: 10.1007/s10773-015-2782-0

Prevalence, Antimicrobial Resistance and Serotype Distribution of Listeria monocytogenes Isolated from Raw Milk and Dairy Products

Journal of Food Safety, 2016, 36(1), 11. DOI: 10.1111/jfs.12208

Determination of Shelf Life for Sausages Produced From Some Freshwater Fish Using Two Different Smoking Methods

Journal of Food Safety, 2016, 36(1), 69. DOI: 10.1111/jfs.12214

Does mineral sulphur availability account for growth performance, bulb development and metabolically related traits in wild leek (Allium ampeloprasum L.; Alliaceae)?

Flora - Morphology, Distribution, Functional Ecology of Plants, 2016, 219(), 8. DOI: 10.1016/j.flora.2015.12.003

Protective effect of green tea against ovarian and endometrial apoptoses in rats treated with depot medroxyprogesterone acetate

Biomarkers and Genomic Medicine, 2015, 7(3), 105. DOI: 10.1016/j.bgm.2015.04.002

Detection of Obfuscation in Java Malware

Procedia Computer Science, 2016, 78(), 521. DOI: 10.1016/j.procs.2016.02.097

Parallel phishing attack recognition using software agents

Journal of Intelligent & Fuzzy Systems, 2017, (), 1. DOI: 10.3233/JIFS-169270

Using Case-Based Reasoning for Phishing Detection

Procedia Computer Science, 2017, 109(), 281. DOI: 10.1016/j.procs.2017.05.352

CBR-PDS: a case-based reasoning phishing detection system

Journal of Ambient Intelligence and Humanized Computing, 2018, (), . DOI: 10.1007/s12652-018-0736-0

SmiDCA: An Anti-Smishing Model with Machine Learning Approach

The Computer Journal, 2018, (), . DOI: 10.1093/comjnl/bxy039

Deep belief network based detection and categorization of malicious URLs

Information Security Journal: A Global Perspective, 2018, (), 1. DOI: 10.1080/19393555.2018.1456577

Intelligent Web-Phishing Detection and Protection Scheme using integrated Features of Images, Frames and Text

Expert Systems with Applications, 2018, (), . DOI: 10.1016/j.eswa.2018.07.067

Detection of phishing websites using a novel twofold ensemble model

Journal of Systems and Information Technology, 2018, (), . DOI: 10.1108/JSIT-09-2017-0074

Leaving All Proxy Server Logs to Paragraph Vector

Journal of Information Processing, 2018, 26(0), 804. DOI: 10.2197/ipsjjip.26.804

Machine Learning and Nature Inspired Based Phishing Detection: A Literature Survey

International Journal on Artificial Intelligence Tools, 2019, 28(05), 1930002. DOI: 10.1142/S0218213019300023

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks

Security and Communication Networks, 2019, 2019(), 1. DOI: 10.1155/2019/2595794

CatchPhish: detection of phishing websites by inspecting URLs

Journal of Ambient Intelligence and Humanized Computing, 2020, 11(2), 813. DOI: 10.1007/s12652-019-01311-4

ACRIPPER: A New Associative Classification Based on RIPPER Algorithm

Journal of Information & Knowledge Management, 2021, 20(01), 2150013. DOI: 10.1142/S0219649221500131

A hybrid firefly and support vector machine classifier for phishing email detection

Kybernetes, 2016, 45(6), 977. DOI: 10.1108/K-07-2014-0129

Detecting Rumors on Social Media Based on a CNN Deep Learning Technique

Arabian Journal for Science and Engineering, 2020, 45(12), 10813. DOI: 10.1007/s13369-020-04839-2

Detecting Phishing SMS Based on Multiple Correlation Algorithms

SN Computer Science, 2020, 1(6), . DOI: 10.1007/s42979-020-00377-8

Improving Spoofed Website Detection Using Machine Learning

Cybernetics and Systems, 2020, (), 1. DOI: 10.1080/01969722.2020.1826659

Machine Intelligence and Smart Systems

Algorithms for Intelligent Systems, 2021, (), 281. DOI: 10.1007/978-981-33-4893-6_25

Applications of Evolutionary Computation

Lecture Notes in Computer Science, 2021, 12694(), 146. DOI: 10.1007/978-3-030-72699-7_10

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Studies in Computational Intelligence, 2021, 919(), 217. DOI: 10.1007/978-3-030-57024-8_9

ICCCE 2020

Lecture Notes in Electrical Engineering, 2021, 698(), 1067. DOI: 10.1007/978-981-15-7961-5_99

Semi-supervised learning approach for malicious URL detection via adversarial learning1

Journal of Intelligent & Fuzzy Systems, 2021, (), 1. DOI: 10.3233/JIFS-210212

A fuzzy-weighted approach for malicious web domain identification

Journal of Intelligent & Fuzzy Systems, 2021, (), 1. DOI: 10.3233/JIFS-200943

Scam Pandemic: How Attackers Exploit Public Fear through Phishing

2020 APWG Symposium on Electronic Crime Research (eCrime), 2020, (), 1. DOI: 10.1109/eCrime51433.2020.9493260

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing

2021 IEEE Symposium on Security and Privacy (SP), 2021, (), 1109. DOI: 10.1109/SP40001.2021.00021

Comparison of simple feedforward neural network, recurrent neural network and ensemble neural networks in phishing detection

Journal of Physics: Conference Series, 2020, 1502(1), 012033. DOI: 10.1088/1742-6596/1502/1/012033

Phishing Emails Detection Using CS-SVM

2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017, (), 1054. DOI: 10.1109/ISPA/IUCC.2017.00160

Ontological Detection of Phishing Emails

2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2018, (), 2858. DOI: 10.1109/SMC.2018.00486

Detecting malicious COVID-19 URLs using machine learning techniques

2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, (), 718. DOI: 10.1109/PerComWorkshops51409.2021.9431064

Detecting and Classifying Phishing Websites by Machine Learning

2021 3rd International Conference on Applied Machine Learning (ICAML), 2021, (), 48. DOI: 10.1109/ICAML54311.2021.00018