Adopting Automated Whitelist Approach for Detecting Phishing Attacks

dc.authorid Misra, Sanjay/0000-0002-3556-9331
dc.authorid Fernandez-Sanz, Luis/0000-0003-0778-0073
dc.authorid Abdulhamid, Shafi'i Muhammad/0000-0001-9196-9447
dc.authorscopusid 53864626700
dc.authorscopusid 56962766700
dc.authorscopusid 57224448974
dc.authorscopusid 25630384100
dc.authorscopusid 56157617800
dc.authorwosid Fernandez, Luis/KHX-5442-2024
dc.authorwosid Misra, Sanjay/K-2203-2014
dc.authorwosid Fernandez-Sanz, Luis/J-4895-2012
dc.authorwosid Abdulhamid, Shafi'i Muhammad/J-4288-2016
dc.contributor.author Azeez, Nureni Ayofe
dc.contributor.author Misra, Sanjay
dc.contributor.author Margaret, Ihotu Agbo
dc.contributor.author Fernandez-Sanz, Luis
dc.contributor.author Abdulhamid, Shafi'i Muhammad
dc.contributor.other Computer Engineering
dc.date.accessioned 2024-07-05T15:19:46Z
dc.date.available 2024-07-05T15:19:46Z
dc.date.issued 2021
dc.department Atılım University en_US
dc.department-temp [Azeez, Nureni Ayofe; Margaret, Ihotu Agbo] Univ Lagos, Dept Comp Sci, Lagos, Nigeria; [Misra, Sanjay] Atilim Univ, Dept Comp Engn, Ankara, Turkey; [Misra, Sanjay] Covenant Univ, Dept Comp Engn, Ota, Nigeria; [Fernandez-Sanz, Luis] Univ Alcala, Dept Comp Sci, Madrid, Spain; [Abdulhamid, Shafi'i Muhammad] Fed Univ Technol, Dept Cyber Secur Sci, Minna, Nigeria en_US
dc.description Misra, Sanjay/0000-0002-3556-9331; Fernandez-Sanz, Luis/0000-0003-0778-0073; Abdulhamid, Shafi'i Muhammad/0000-0001-9196-9447 en_US
dc.description.abstract Phishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of quick access time in a real-time environment. However, it has been established that blacklist solution methods offer quick and immediate access time but with a low detection rate. This research paper presents an automated white-list approach for detecting phishing attacks. The white-list is determined by carrying out a detailed analysis between the visual link and the actual link. The similarities of the known trusted site are calculated by juxtaposing the domain name with the contents of the whitelist and later match it with the IP address before a decision is made and further analyzing the actual link and the visual link by calculating the similarities of the known trusted site. The technique then takes a final decision on the extracted information from the hyperlink, which can also be obtained from the web address provided by the user. The experiments carried out provided a very high level of accuracy, specifically, when the dataset was relatively at the lowest level. Six different datasets were used to perform the experiments. The average accuracy obtained after the six experiments was 96.17% and the approach detects phishing sites with a 95.0% true positive rate. It was observed that the level of accuracy varies from one dataset to another. This result shows that the proposed method performs better than similar approaches benchmarked with. The efficiency of the approach was further established through its computation time, memory, bandwidth as well as other computational resources that were utilized with the minimum requirements when compared with other approaches. This solution has provided immense benefits over the existing solutions by reducing the memory requirements and computational complexity, among other benefits. It has also shown that the proposed method can provide more robust detection performances when compared to other techniques. (c) 2021 Elsevier Ltd. All rights reserved. en_US
dc.identifier.citationcount 20
dc.identifier.doi 10.1016/j.cose.2021.102328
dc.identifier.issn 0167-4048
dc.identifier.issn 1872-6208
dc.identifier.scopus 2-s2.0-85107530292
dc.identifier.uri https://doi.org/10.1016/j.cose.2021.102328
dc.identifier.uri https://hdl.handle.net/20.500.14411/2017
dc.identifier.volume 108 en_US
dc.identifier.wos WOS:000681264400002
dc.identifier.wosquality Q2
dc.institutionauthor Mısra, Sanjay
dc.language.iso en en_US
dc.publisher Elsevier Advanced Technology en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 51
dc.subject Phishing en_US
dc.subject Blacklist en_US
dc.subject Whitelist en_US
dc.subject Cybersecurity en_US
dc.subject False positive en_US
dc.subject False negative en_US
dc.title Adopting Automated Whitelist Approach for Detecting Phishing Attacks en_US
dc.type Article en_US
dc.wos.citedbyCount 29
dspace.entity.type Publication
relation.isAuthorOfPublication 53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isAuthorOfPublication.latestForDiscovery 53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isOrgUnitOfPublication e0809e2c-77a7-4f04-9cb0-4bccec9395fa
relation.isOrgUnitOfPublication.latestForDiscovery e0809e2c-77a7-4f04-9cb0-4bccec9395fa

Files

Collections