Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 425731, 6 pages
http://dx.doi.org/10.1155/2014/425731
Research Article

Classification of Phishing Email Using Random Forest Machine Learning Technique

School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Private Bag Box X54001, Durban 4000, South Africa

Received 23 January 2014; Accepted 11 March 2014; Published 3 April 2014

Academic Editor: Olabisi Falowo

Copyright © 2014 Andronicus A. Akinyelu and Aderemi O. Adewumi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Khonji, Y. Iraqi, and A. Jones, “Phishing detection: a literature survey,” IEEE Communications & Surveys Tutorials, vol. 15, no. 4, pp. 2091–2121, 2013. View at Publisher · View at Google Scholar
  2. S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, “Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions,” in Proceedings of the 28th Annual SIGCHI Conference on Human Factors in Computing Systems (CHI '10), pp. 373–382, Atlanta, Ga, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Behdad, L. Barone, M. Bennamoun, and T. French, “Nature-inspired techniques in the context of fraud detection,” IEEE Transactions on Systems, Man, and Cybernetics C: Applications and Reviews, vol. 42, no. 6, pp. 1273–1290, 2012. View at Publisher · View at Google Scholar
  4. P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “PhishNet: predictive blacklisting to detect phishing attacks,” in Proceedings of the IEEE Conference on Computer Communications (IEEE INFOCOM '10), pp. 1–5, IEEE, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. L. F. Cranor, S. Egelman, J. I. Hong, and Y. Zhang, “Phinding phish: an evaluation of anti-phishing toolbars,” in Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS '07), San Diego, Calif, USA, 2007.
  6. N. Chou, R. Ledesma, Y. Teraguchi, and J. C. Mitchell, “Client-side defense against web-based identity theft,” in Proceedings of the 11th Annual Network & Distributed System Security Symposium (NDSS '04), San Diego, Calif, USA, February 2004.
  7. W. D. Yu, S. Nargundkar, and N. Tiruthani, “PhishCatch—a phishing detection tool,” in Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC '09), vol. 2, pp. 451–456, Seattle, Wash, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zhang, J. I. Hong, and L. F. Cranor, “Cantina: a content-based approach to detecting phishing web sites,” in Proceedings of the 16th International World Wide Web Conference (WWW '07), pp. 639–648, ACM, Alberta, Canada, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. I. Fette, N. Sadeh, and A. Tomasic, “Learning to detect phishing emails,” in Proceedings of the 16th International World Wide Web Conference (WWW '07), pp. 649–656, Alberta, Canada, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Bergholz, J. de Beer, S. Glahn, M. F. Moens, G. Paaß, and S. Strobel, “New filtering approaches for phishing email,” Journal of Computer Security, vol. 18, no. 1, pp. 7–35, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Cao, W. Han, and Y. Le, “Anti-phishing based on automated individual white-list,” in Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM '08), pp. 51–59, ACM, Alexandria, Va, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Ma, B. Ofoghi, P. Watters, and S. Brown, “Detecting phishing emails using hybrid features,” in Proccedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (UIC-ATC '09), pp. 493–497, IEEE, Brisbane, Australia, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. Apache Software Foundation, “Spam assassin homepage,” 2006, http://spamassassin.apache.org/.
  14. K. Albrecht, N. Burri, and R. Wattenhofer, “Spamato-an extendable spam filter system,” in Proceedings of the 2nd Conference on Email and Anti-Spam (CEAS '05), Stanford, Calif, USA, 2005.
  15. A. Emigh, “Phishing attacks: information flow and chokepoints,” in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, M. Jakobsson and S. Myers, Eds., pp. 31–64, John Wiley & Sons, New York, NY, USA, 2007. View at Publisher · View at Google Scholar
  16. N. Zhang and Y. Yuan, “Phishing detection using neural network,” http://cs229.stanford.edu/proj2012/ZhangYuan-PhishingDetectionUsingNeuralNetwork.pdf.
  17. A. ALmomani, T.-C. Wan, A. Altaher et al., “Evolving fuzzy neural network for phishing emails detection,” Journal of Computer Science, vol. 8, no. 7, pp. 1099–1107, 2012. View at Publisher · View at Google Scholar
  18. R. Basnet, S. Mukkamala, and A. H. Sung, “Detection of phishing attacks: a machine learning approach,” in Soft Computing Applications in Industry, pp. 373–383, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  19. J. Nazario, “Phishingcorpus homepage,” 2006, http://monkey.org/%7Ejose/wiki/doku.php?id=PhishingCorpus.
  20. L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  21. L. Breiman and A. Cutler, “Random forests-classification description,” Department of Statistics Homepage, 2007, http://www.stat.berkeley.edu/~breiman/RandomForests/cc_home.htm.
  22. I. Koprinska, J. Poon, J. Clark, and J. Chan, “Learning to classify e-mail,” Information Sciences, vol. 177, no. 10, pp. 2167–2187, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Whittaker, B. Ryner, and M. Nazif, “Large-scale automatic classification of phishing pages,” in Proceedings of the 17th Annual Network & Distributed System Security Symposium (NDSS '10), The Internet Society, San Diego, Calif, USA, 2010.
  24. T. M. Mitchell, Machine Learning, McGraw-Hill, New York, NY, USA, 1997.