Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 9838169, 10 pages
https://doi.org/10.1155/2017/9838169
Research Article

New Hybrid Features Selection Method: A Case Study on Websites Phishing

College of Computer Science and Information System, Najran University, Najran, Saudi Arabia

Correspondence should be addressed to Khairan D. Rajab; moc.liamg@rnariahk

Received 4 November 2016; Revised 26 February 2017; Accepted 8 March 2017; Published 19 March 2017

Academic Editor: Muhammad Khurram Khan

Copyright © 2017 Khairan D. Rajab. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. M. Mohammad, F. Thabtah, and L. Mc-Cluskey, “Predicting phishing websites based on self-structuring neural network,” Neural Computing and Applications, vol. 25, no. 2, pp. 443–458, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. N. Abdelhamid, A. Ayesh, and F. Thabtah, “Phishing detection based associative classification data mining,” Expert Systems with Applications, vol. 41, no. 13, pp. 5948–5959, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. I. Qabajeh and F. Thabtah, “An experimental study for assessing email classification attributes using feature selection methods,” in Proceedings of the 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT '14), pp. 125–132, Amman, Jordan, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. R. B. Basnet, A. H. Sung, and Q. Liu, “Feature selection for improved phishing detection,” in Proceedings of the 25th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE '12), pp. 252–261, Springer, Dalian, China, 2012.
  5. H. Zuhair, A. Selmat, and M. Salleh, “The effect of feature selection on phish website detection,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 10, pp. 221–232, 2015. View at Publisher · View at Google Scholar
  6. N. Abdelhamid, A. Ayesh, and F. Thabtah, “Phishing detection using associative classification data mining,” in Proceedings of the International Conference on Artificial Intelligence (ICAI '13), pp. 491–499, 2013.
  7. E. Uzun, H. V. Agun, and T. Yerlikaya, “A hybrid approach for extracting informative content from web pages,” Information Processing and Management, vol. 49, no. 4, pp. 928–944, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kauffmann, 1993.
  9. H. Liu and R. Setiono, “Chi2: feature selection and discretization of numeric attributes,” in Proceedings of the IEEE 7th International Conference on Tools with Artificial Intelligence (ICTAI '95), pp. 388–391, November 1995. View at Scopus
  10. R. M. Mohammad, F. Thabtah, and L. McCluskey, “An assessment of features related to phishing websites using an automated technique,” in Proceedings of the 7th International Conference for Internet Technology and Secured Transactions (ICITST '12), pp. 492–497, IEEE, London ,UK, December 2012. View at Scopus
  11. A. K. Uysal, “An improved global feature selection scheme for text classification,” Expert Systems with Applications, vol. 43, pp. 82–92, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. W. W. Cohen, “Fast effective rule induction,” in Proceedings of the 12th International Conference on Machine Learning, pp. 115–123, Tahoe City, Calif, USA, July 1995.
  13. A. Tewari, A. K. Jain, and B. B. Gupta, “Recent survey of various defense mechanisms against phishing attacks,” Journal of Information Privacy and Security, vol. 12, no. 1, pp. 3–13, 2016. View at Publisher · View at Google Scholar
  14. A. K. Jain and B. B. Gupta, “A novel approach to protect against phishing attacks at client side using auto-updated white-list,” EURASIP Journal on Information Security, vol. 2016, no. 1, article 9, pp. 1–11, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, “A survey of phishing email filtering techniques,” IEEE Communications Surveys and Tutorials, vol. 15, no. 4, pp. 2070–2090, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. B. B. Gupta, A. Tewari, A. K. Jain, and D. P. Agrawal, “Fighting against phishing attacks: state of the art and future challenges,” Neural Computing and Applications, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Thabtah, W. Hadi, N. Abdelhamid, and A. Issa, “Prediction phase in associative classification mining,” International Journal of Software Engineering and Knowledge Engineering, vol. 21, no. 6, pp. 855–876, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. F. Thabtah and S. Hammoud, “MR-ARM: a map-reduce association rule mining framework,” Parallel Processing Letters, vol. 23, no. 3, Article ID 1350012, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. J. R. Quinlan, “Induction of decision trees,” Machine Learning, vol. 1, no. 1, pp. 81–106, 1986. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Azhagusundari and A. S. Thanamani, “Feature selection based on information gain,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 2, no. 2, pp. 18–21, 2013. View at Google Scholar
  21. S. Oreski and G. Oreski, “Genetic algorithm-based heuristic for feature selection in credit risk assessment,” Expert Systems with Applications, vol. 41, no. 4, pp. 2052–2064, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. N. Hoque, D. K. Bhattacharyya, and J. K. Kalita, “MIFS-ND: a mutual information-based feature selection method,” Expert Systems with Applications, vol. 41, no. 14, pp. 6371–6385, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. A. Fahad, Z. Tari, I. Khalil, I. Habib, and H. Alnuweiri, “Toward an efficient and scalable feature selection approach for internet traffic classification,” Computer Networks, vol. 57, no. 9, pp. 2040–2057, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Abbasi, S. France, Z. Zhang, and H. Chen, “Selecting attributes for sentiment classification using feature relation networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 3, pp. 447–462, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. E. Haddi, X. Liu, and Y. Shi, “The role of text pre-processing in sentiment analysis,” Procedia Computer Science, vol. 17, pp. 26–32, 2013. View at Google Scholar
  26. C.-F. Tsai and Y.-C. Hsiao, “Combining multiple feature selection methods for stock prediction: union, intersection, and multi-intersection approaches,” Decision Support Systems, vol. 50, no. 1, pp. 258–269, 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. X.-X. Zhou, Y. Zhang, G. Ji et al., “Detection of abnormal MR brains based on wavelet entropy and feature selection,” IEEJ Transactions on Electrical and Electronic Engineering, vol. 11, no. 3, pp. 364–373, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Al-Thubaity, N. Abanumay, S. Al-Jerayyed, A. Alrukban, and Z. Mannaa, “The effect of combining different feature selection methods on arabic text classification,” in Proceedings of the 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD '13), pp. 211–216, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. M. A. Hall, Correlation-based feature selection for machine learning [Ph.D. thesis], The University of Waikato, 1999.
  30. M. Lichman, UCI Machine Learning Repository, 2013, vol. 114, 2015, http://archive.ics.uci.edu/ml.
  31. R. Mohammad, F. A. Thabtah, and T. McCluskey, “Phishing websites dataset,” 2015, https://archive.ics.uci.edu/ml/datasets/Phishing+Websites.
  32. Millersmiles, 2015, http://www.millersmiles.co.uk/.
  33. “Phishtank. (2015). phishtank: Phising on the internet,” http://www.phishtank.com/.
  34. I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2005.