Fake Webpages Detection Using Parallel Autoencoder Neural Networks

Document Type : Original Article

Authors

Islamic Azad University, Borojerd Branch

Abstract

Fake web pages attempt to steal a user's confidential information such as bank account password and email password. These fake pages are actually made similar to the pages of reputable websites such as online payment portals, Yahoo and Google, and in such a way users are drawn to these pages. This type of Internet attack is called phishing attacks. Online detection of fake pages with the help of a smart software can prevent the theft of user information and increase security in the web space. In this paper, a new approach based on autoencoder neural networks is introduced. The proposed method employs two Parallel Autoencoder (PAE) networks, one of which is trained with regular pages and the other with fake pages. At the time of detection, the type of input web page is determined based on the encoded vectors obtained from both AEs in the parallel network and a layer of conventional artificial neural network such as Softmax. In practical applications, whenever such a fake page is detected, it is promptly warned or blocked through the browser. Experimental results of the proposed method with the help of “Phishing Websites” dataset and accuracy, precision and recall criteria show that PAE networks perform better than other machine learning methods in detecting fake web pages.

Keywords


[1] H. Bahrami, “Improving IWO Algorithm in Generation Optimization Problems using Experiment Design,” M.Sc. Thesis, Ferdosi Univ., Mashhad, 2010. (In Persian)##
[2] M. Moghimi, H. Albaripoor, and M. R. Amin-Naseri, “Expert System Designing for Phishing Attacks Detection in E-Banking,” Journal of Iranian Association of Electrical and Electronics Engineers, vol. 12(2), 2015. (In Persian)##
[3] B. Bahreini, A. Malahzadeh, and M. Soleimani, “Antenna Array Designing using IWO algorithm for MIMO systems in 5.8 GHz frequency,” 18th Iran Electrical Engineering Conference, 2010. (In Persian)##
[4] M. Alsharnouby, F. Alaca, and S. Chiasson, “Why phishing still works: user strategies for combating phishing attacks,” Int. J. Hum-Comput. St., vol. 82, pp. 69-82, 2008.##
[5] H. Rahimi, I. Rahmi, and J. H. Abawajy, “An approach for profiling phishing activities,” Cumpot. Secur., vol. 45, pp. 27-41, 2014.##
[6] W. D. Yu, S. Nargundkar, and N. Tiruthani, “A phishing vulnerability analysis of web based systems,” Cumput. Commun., pp. 326-331, 2008.##
[7] B. Vucetic and J. Yuan, “Space-time coding,” JWS, 2003.##
[8] K. R. Sahu and J. Dubey, “A Survey on Phishing Attacks,” Int. J. Comut. Appl., vol. 88, 2014.##
[9] N. Abdelhamid, A. Aladdin, and T. Fadi, “Phishing detection based associative classification data mining,” Expert. Sys. Appl., vol. 41 pp. 5948-5959, 2014.##
[10] C. L. Tan, C. Kang Leng, and W. KokSheik, “PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder,” Decis. Support Syst., vol. 88, pp.18-27, 2016.##
[11] N. A. G. Arachchilage and S. Love, “Security awareness of computer users: A phishing threat avoidance perspective,” Comput. Human Behav., vol. 38, pp. 304-312, 2014.##
[12] Y. Li, L. Yang, and J. Ding, “A minimum enclosing ball-based support vector machine approach for detection of phishing websites,” OPTIC (Stuttg), vol. 127.1, pp. 345-351, 2016.##
[13] K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram, “The design of phishing studies: Challenges for researchers,” Comput. Secur., vol. 52, pp.194-206, 2016.##
[14] M. Zabihimayvan and D. Doran, “Fuzzy rough set feature selection to enhance phishing attack detection,” Fuzz-IEEE, pp. 1-6, 2019.##
[15] T. Lam and H. Kettani, “PhAttApp: A Phishing Attack Detection Application,” 3rd International Conference on Information System and Data Mining, pp. 154-158, 2019.##
[16] B. Gupta and A. K. Jain, “Phishing Attack Detection using a Search Engine and Heuristics-based Technique,” J. Inf. Technol-Uk, vol. 13, pp. 94-109, 2020.##
[17] P. Yang, G. Zhao, and P. Zeng, “Phishing website detection based on multidimensional features driven by deep learning,” IEEE ACCESS, vol. 7, pp. 15196-15209, 2019.##
[18] UCI Machine Learning Repository, “Phishing Websites Dataset,” 2015. archive.ics.uci.edu/ml/datasets/phishing+websites.##