CFP last date
22 July 2024
Reseach Article

Intelligent Phishing Possibility Detector

by Rajeev Kumar Shah, Md. Altab Hossin, Asif Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 7
Year of Publication: 2016
Authors: Rajeev Kumar Shah, Md. Altab Hossin, Asif Khan

Rajeev Kumar Shah, Md. Altab Hossin, Asif Khan . Intelligent Phishing Possibility Detector. International Journal of Computer Applications. 148, 7 ( Aug 2016), 4-8. DOI=10.5120/ijca2016911206

@article{ 10.5120/ijca2016911206,
author = { Rajeev Kumar Shah, Md. Altab Hossin, Asif Khan },
title = { Intelligent Phishing Possibility Detector },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 7 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016911206 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:52:41.108251+05:30
%A Rajeev Kumar Shah
%A Md. Altab Hossin
%A Asif Khan
%T Intelligent Phishing Possibility Detector
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 7
%P 4-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Phishing techniques have not only grown in number, but also in sophistication. Phishers might have a lot of approaches and tactics to conduct a well-designed phishing attack. The on-line banking consumers and payment service providers, those are the main targets of the phishing attacks, are facing substantial financial loss and lack of trust in Internet-based services. In order to overcome these, there is an urgent need to find solutions to combat phishing attacks. Detecting the phishing website is a complex task which requires significant expert knowledge and experience. So far, various solutions have been proposed and developed to address these problems. Most of these approaches are not able to make a decision dynamically on whether the site is in fact phished, giving rise to a large number of false responses. This is mainly due to limitation of the previously proposed approaches, for example depending only on fixed black and white listing database, missing of human intelligence and experts, poor scalability and their timeliness. In this research the application of an intelligent fuzzy-based classification system for e-banking phishing website detection is investigated and developed. The main aim of the proposed system is to provide protection to the users from phisher’s deception tricks, giving them the ability to detect the legitimacy of the websites. The proposed intelligent phishing detection system employed Fuzzy Logic (FL) model with association classification mining algorithms. The approach combined the capabilities of fuzzy reasoning in measuring imprecise and dynamic phishing features, with the capability to classify the phishing fuzzy rules.

  1. Intelligent phishing detection system for e-banking using fuzzy data mining by Maher Aburrous, M.A. Hossain, Keshav Dahal, Fadi Thabtah in 2010.
  2. Fette Ian, Sadeh Norman, & Tomasic Anthony (2006). Learning to detect phishing emails. Institute for Software Research International. Behavioral response to phishing risk by Julie S. Downs, Mandy Holbrook and Lorrie Faith Cranor.
  3. Ahmed Abbasi, Fatemeh “Mariam” Zahedi, Yan Chen “Impact of Anti-Phishing Tool Performance on Attack Success Rates”.
  4. Weiwei Zhuang, Qingshan Jiang, Tengke Xiong,“An Intelligent Anti-phishing Strategy Model for Phishing Website Detection”.
  5. Mallikka Rajalingam, Saleh Ali Alomari, Putra Sumari “Prevention of Phishing Attacks Based on Discriminative
  6. Key Point Features of WebPages”, International Journal of Computer Science and Security (IJCSS), Vol. 6, 2012.
  7. M. J. et al., “What instills trust? a qualitative study of phishing,” inProceeding of first Int’l Workshop on Usable Security, Springer-Verlag,2007.
  8. ASIF KHAN, and JIAN-PING LI, "Vision Based Geo Navigation Information Retrieval”, (IJACSA), Vol. 7, No. 1, 2016
  9. P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, andE. Nunge, “Protecting people from phishing: The design and evaluationof an embedded training email system,” inCHI2007: Proceedings of the Conference on Human Factors in Computing Systems, 2007.
Index Terms

Computer Science
Information Sciences


Phishing e-banking fuzzy logic association classification machine- learning internet security data mining.