作者
Youness Mourtaji, Mohammed Bouhorma, Daniyal Alghazzawi, Ghadah Aldabbagh, Abdullah Alghamdi
发表日期
2021
期刊
Wireless Communications and Mobile Computing
卷号
2021
期号
1
页码范围
8241104
出版商
Hindawi
简介
The phenomenon of phishing has now been a common threat, since many individuals and webpages have been observed to be attacked by phishers. The common purpose of phishing activities is to obtain user’s personal information for illegitimate usage. Considering the growing intensity of the issue, this study is aimed at developing a new hybrid rule‐based solution by incorporating six different algorithm models that may efficiently detect and control the phishing issue. The study incorporates 37 features extracted from six different methods including the black listed method, lexical and host method, content method, identity method, identity similarity method, visual similarity method, and behavioral method. Furthermore, comparative analysis was undertaken between different machine learning and deep learning models which includes CART (decision trees), SVM (support vector machines), or KNN (K‐nearest …
引用总数
学术搜索中的文章
Y Mourtaji, M Bouhorma, D Alghazzawi, G Aldabbagh… - Wireless Communications and Mobile Computing, 2021