Computing and Library Services - delivering an inspiring information environment

Intelligent Rule based Phishing Websites Classification

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2014) Intelligent Rule based Phishing Websites Classification. IET Information Security, 8 (3). pp. 153-160. ISSN 1751-8709

[img] PDF - Accepted Version
Download (265kB)
[img] Microsoft Word - Accepted Version
Restricted to Repository staff only

Download (184kB)


Phishing is described as the art of emulating a website of a creditable firm intending to grab user’s private information such as usernames, passwords and social security number. Phishing websites comprise a variety of cues within its content-parts as well as browser-based security indicators. Several solutions have been proposed to tackle phishing. Nevertheless, there is no single magic bullet that can solve this threat radically. One of the promising techniques that can be used in predicting phishing attacks is based on data mining. Particularly the “induction of classification rules”, since anti-phishing solutions aim to predict the website type accurately and these exactly fit the classification data mining. In this paper, we shed light on the important features that distinguish phishing websites from legitimate ones and assess how rule-based classification data mining techniques are applicable in predicting phishing websites. We also experimentally show the ideal rule based classification technique for detecting phishing.

Item Type: Article
Subjects: T Technology > TN Mining engineering. Metallurgy
Schools: School of Computing and Engineering
School of Computing and Engineering > High-Performance Intelligent Computing > Planning, Autonomy and Representation of Knowledge
School of Computing and Engineering > High-Performance Intelligent Computing > Planning, Autonomy and Representation of Knowledge
Related URLs:

1. Nuttapong Sanglerdsinlapachai , Arnon Rungsawang. Using Domain Top-page Similarity Feature in Machine Learning-based Web. In Third International Conference on Knowledge Discovery and Data Mining; 2010: IEEE. p. 187-190.
2. Sophie GP, Gustavo GG, Maryline L. Decisive Heuristics to Differentiate Legitimate from Phishing Sites. In 2011 Conference on Network and Information Systems Security; 2011: IEEE. p. 1-9.
3. Guang X, Jason o, Carolyn P R, Lorrie C. CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites. ACM Transactions on Information and System Security. 2011 Sep: p. 1-28.
4. Witten IH, Frank E. Data mining: practical machine learning tools and techniques with Java implementations. New York, NY, USA:; March 2002.
5. H DJ. Rule induction-machine learning techniques. Computing & Control Engineering Journal. 1994 October: p. 249-255.
6. Gartner, Inc. [Online]. Available from:
7. Lennon, M. Security Week. [Online].; 2011. Available from:
8. Aburrous, M , Hossain, M. A. , Dahal, K. , Fadi, T. Predicting Phishing Websites using Classification Mining Techniques. In Seventh International Conference on Information Technology.; 2010; Las Vegas, Nevada, USA.: IEEE. p. 176-181.
9. Thabtah F, Peter C, Peng Y. MCAR: Multi-class Classification based on Association Rule. In The 3rd ACS/IEEE International Conference on Computer Systems and Applications; 2005. p. 33.
10. Hu K, Lu Y, Zhou L, Shi C. Integrating Classification and association rule Mining. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98, Plenary Presentation); 1998; New York, USA: Springer-Verlag. p. 443 - 447.
11. Quinlan JR. Improved use of continuous attributes in c4.5. Journal of Artificial Intelligence Research. 1996;: p. 77-90.
12. Cendrowska J. PRISM: An algorithm for inducing modular rule. International Journal of Man-Machine Studies. 1987;: p. 349-370.
13. Aburrous , Hossain MA, Dahal K, Thabtah F. Intelligent phishing detection system for e-banking using fuzzy data mining. Expert Systems with Applications: An International Journal. 2010 December: p. 7913-7921.
14. Pan , Ding. Anomaly Based Web Phishing Page Detection. In In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference.; Dec. 2006: IEEE. p. 381-392.
15. Cortes C, Vapnik V. Support-Vector Networks. Machine Learning. Sept.1995;: p. 273 - 297.
16. Zhang , Hong , Cranor. CANTINA: A Content-Based Approach to Detect Phishing Web Sites. In Proceedings of the 16th World Wide Web Conference; May, 2007.
17. Manning C, Raghavan , Schütze H. Introduction to Information Retrieval: Cambridge University Press; 2008.
18. Sadeh N, Tomasic A, Fette I. Learning to detect phishing emails. Proceedings of the 16th international conference on World Wide Web. 2007: p. 649-656.
19. PhishTank. [Online].; 2006 [cited 2011 November 25. Available from:
20. millersmiles. millersmiles. [Online].; 2011 [cited 2011 October. Available from:
21. Horng SJ, Fan P, Khan MK, Run RS, Lai JL, Chen RJ, et al. An efficient phishing webpage detector. Expert Systems with Applications: An International Journal. 2011; 38 (10): p. 12018-12027.
22. More than 450 Phishing Attacks Used SSL in 2005. [Online]. [Cited 2012 March 8. Available from:
23. WhoIS. [Online]. Available from:
24. Rasmussen R, Aaron G. Global Phishing Survey: Trends and Domain Name Use 2H2009 [Survey]. Lexington; 2010. Available from:
25. Ask Sucuri. Security Blog. [Online].; 2011. Available from:
26. Alexa the Web Information Company. [Online]. [Cited 2012 January 26. Available from:
27. Yahoo Directory. [Online]. Available from:
28. Starting Point Directory. [Online]. Available from:
29. Agrawal R, Srikant R. Fast Algorithms for Mining Association Rules. VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases. 1994;: p. 487-499.
30. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH. Waikato Environment for Knowledge Analysis. [Online]. Available from:

Depositing User: Rami Mohammad
Date Deposited: 06 Aug 2013 14:07
Last Modified: 05 Nov 2015 01:19


Downloads per month over past year

Repository Staff Only: item control page

View Item View Item

University of Huddersfield, Queensgate, Huddersfield, HD1 3DH Copyright and Disclaimer All rights reserved ©