Evolving Fuzzy Neural Network for Phishing Emails Detection
Abstract
One of the broadly used internet attacks to deceive customers financially in banks and agencies is unknown "zero-day" phishing Emails "zero-day" phishing Emails is a new phishing email that it has not been trained on old dataset, not included in black list. Accordingly, the current paper seeks to Detection and Prediction of unknown "zero-day" phishing Emails by provide a new framework called Phishing Evolving Neural Fuzzy Framework (PENFF) that is based on adoptive Evolving Fuzzy Neural Network (EFuNN). PENFF does the process of detection of phishing email depending on the level of features similarity between body email and URL email features. The totality of the common features vector is controlled by EFuNN to create rules that help predict the phishing email value in online mode. The proposed framework has proved its ability to detect phishing emails by decreasing the error rate in classification process. The current approach is considered a highly compacted framework. As a performance indicator; the Root Mean Square Error (RMSE) and Non-Dimensional Error Index (NDEI) has 0.12 and 0.21 respectively, which has low error rate compared with other approaches Furthermore, this approach has learning capability with footprint consuming memory.
References (20)
- Abu-Nimeh, S., D. Nappa, X. Wang and S. Nair, 2007. A comparison of machine learning techniques for phishing detection. Proceedings of the Anti- Phishing Working Groups 2nd Annual Ecrime Researchers Summit, Oct. 22-24, ACM, Pittsburgh, USA, pp: 60-69. DOI: 10.1145/1299015.1299021
- ALmomani, A., 2011. An online model on evolving phishing e-mail detection and classification method. J. Applied Sci., 11: 3301-3307.
- APWG, 2010. Phishing activity trends report. APWG. Basnet, R., S. Mukkamala and A.H. Sung, 2008. Detection of phishing attacks: A machine learning approach. Studies Fuzziness Soft Comput., 226: 373-383.
- Christine, E., J.J.O. Drake and J. Eugene and Koontz, 2004. Anatomy of a phishing email. Proceedings of the 1st Conference on Email and Anti-Spam, (CEAS' 04), Mountain View, CA, USA.
- Cutler, D.R., T.C. Edwards Jr., K.H. Beard, A. Cutler and K.T. Hess et al., 2007. Random forests for classification in ecology. Ecology, 88: 2783-2792. PMID: 18051647
- Dazeley, R., J.L. Yearwood, B.H. Kang and A.V. Kelarev, 2010. Consensus clustering and supervised classification for profiling phishing emails in internet commerce security. Proceedings of the 11th International Conference on Knowledge Management and Acquisition for Smart Systems and Services, (PKAW'10), Heidelberg, pp: 235-246.
- Diller, D., 2010. Math Work Stations: Independent Learning You Can Count On, K-2. 1st Edn., Stenhouse Publishers, Portland, ISBN-10: 1571107932, pp: 299.
- Fette, I., N. Sadeh and A. Tomasic, 2007. Learning to detect phishing emails. Proceedings of the 16th International World Wide Web Conference, May 08-12, ACM Press, Banff, Alberta, Canada, pp: 649-656. DOI: 10.1145/1242572.1242660
- IID, 2011. Q3 2011 eCrime Trends Report released. IID.
- Inomata, A., M. Rahman, T. Okamoto and E. Okamoto, 2005. A novel mail filtering method against phishing. Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Aug. 24-26, IEEE Xplore Press, Japan, pp: 221-224. DOI: 10.1109/PACRIM.2005.1517265
- Islam, M.R., J. Abawajy and M. Warren, 2009. Multi- tier phishing email classification with an impact of classifier rescheduling. Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms and Networks, Dec. 14-16, IEEE Xplore Press, USA., pp: 789-793. DOI: 10.1109/I- SPAN.2009.142
- Kasabov, N. and B. Woodford, 1999. Rule insertion and rule extraction from evolving fuzzy neural networks: Algorithms and applications for building adaptive, intelligent expert systems. Proceedings of the IEEE International Fuzzy Systems Conference, Aug. 22-25, IEEE Xplore Press, New Zealand, pp: 1406-1411. DOI: 10.1109/FUZZY.1999.790109
- Kasabov, N.K., 2007. Evolving Connectionist Systems: The Knowledge Engineering Approach. 1st Edn., Springer, London, ISBN-10: 1846283450, pp: 457.
- Kim, J. and N. Kasabov, 1999. Hyfis: Adaptive neuro- fuzzy inference systems and their application to nonlinear dynamical systems. Neural Netw., 12: 1301-1319. PMID: 12662634
- Koprinska, I. and N. Kasabov, 1999. An application of evolving fuzzy neural network for compressed video parsing. Proceedings of the ICONIP/ANZIIS/ANNES'99 Workshop, Nov. 22- 24, Dunedin, New Zealand, pp: 96-102.
- LLCB, 2010. Apache Software Foundation Projects: Apache Httpd Modules, List of Apache Software Foundation Projects, Mod Ssl, Apache Gump, Mod Qos. 1st Edn., General Books LLC., ISBN-10: 1157769128, pp: 76.
- McCall, T., 2007. Gartner survey shows phishing attacks escalated in 2007; more than \$3 billion lost to these attacks. Stephane GALLAND.
- Mori, T., 2002. Information gain ratio as term weight: The case of summarization of IR results. Proceedings of the 19th International Conference on Computational Linguistics, (CL' 02), ACLS, USA., pp: 1-7. DOI: 10.3115/1072228.1072246
- Saberi, A., M. Vahidi and B.M. Bidgoli, 2007. Learn to detect phishing scams using learning and ensemble? methods. Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology Workshops, (WIIATW' 07), ACM, USA., pp: 311-314.
- Yearwood, J., M. Mammadov and A. Banerjee, 2010. Profiling phishing emails based on hyperlink information. Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, Aug. 9-11, IEEE Xplore Press, USA., pp: 120-127. DOI: 10.1109/ASONAM.2010.56