Skip to main content
Log in

Prediction of Phishing Websites Using Stacked Ensemble Method and Hybrid Features Selection Method

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Phishing is considered a big concern in this age of data and digital technologies because of its significant influence on the banking and online retailing industries. Cybercriminals target all economic activity on the Internet; thus, it is critical to take security precautions to safeguard assets. One of the first steps in constructing a safe cyberspace is to prevent phishing attacks before they happen. The detection mechanisms for these assaults were created using machine learning and other methods. However, there is still room for improvement in terms of detection accuracy. This paper proposes the optimization of an ensemble classification algorithm for phishing website (PW) detection. The suggested technique was optimised using a hybrid features selection method (Chi-square, extra tree, and heatmap) by modifying numerous machine learning (ML) method parameters, including random forest, naive Bayes, J48, and KNN. These were achieved by rating the optimal classifiers and selecting the top classifiers to serve as the foundation for the suggested technique. The obtained results by all experiments show that assigned optimized stacking ensemble approach outperforms previous ML-based detection methods. The level of precision attained was 99.7%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Buber E, Demir Ö, Sahingoz OK. Feature selections for the machine learning based detection of phishing websites. In: 2017 International artificial intelligence and data processing symposium (IDAP). IEEE; 2017. pp. 1–5. https://doi.org/10.1109/IDAP.2017.8090317.

  2. Vijayalakshmi M, Mercy Shalinie S, Yang MH, Raja Meenakshi U. Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. IET Networks. 2020;9(5):235–46.

    Article  Google Scholar 

  3. Jain AK, Gupta BB. A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J Inf Secur. 2016;2016:9.

    Article  Google Scholar 

  4. Jain AK, Gupta BB. “PHISH-SAFE: URL features-based phishing detection system using machine learning”, Cyber Security. Adv Intell Syst Comput. 2018. https://doi.org/10.1007/978-981-10-8536-9_44.

    Article  Google Scholar 

  5. Purbay M, Kumar D. Split behavior of supervised machine learning algorithms for phishing URL detection. In: Lecture Notes in Electrical Engineering, vol. 683, 2021; https://doi.org/10.1007/978-981-15-6840-4_40.

  6. Gandotra E, Gupta D. An efficient approach for phishing detection using machine learning. In: Algorithms for Intelligent Systems. Singapore: Springer; 2021. https://doi.org/10.1007/978-981-15-8711-5_12.

    Book  Google Scholar 

  7. Basit A, Zafar M, Javed AR, Jalil Z. A novel ensemble machine learning method to detect phishing attack. In: 2020 IEEE 23rd international multitopic conference (INMIC). IEEE; 2020. pp. 1–5. https://doi.org/10.1109/INMIC50486.2020.9318210.

  8. Le H, Pham Q, Sahoo D, and Hoi SCH. URLNet: Learning a URL representation with deep learning for malicious URL detection. Conference’17, Washington, DC, USA, arXiv:1802.03162, 2017.

  9. Hong J, Kim T, Liu J, Park N, Kim SW. “Phishing URL detection with lexical features and blacklisted domains”, Autonomous Secure Cyber Systems. Springer, https://doi.org/10.1007/978-3-030-33432-1_12.

  10. Kumar J, Santhanavijayan A, Janet B, Rajendran B and Bindhumadhava BS. Phishing website classification and detection using machine learning. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020, pp. 1–6, https://doi.org/10.1109/ICCCI48352.2020.9104161.

  11. Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. 2019;7:82512–21.

    Article  Google Scholar 

  12. Hassan YA, Abdelfettah B. Using case- based reasoning for phishing detection. Procedia Comput Sci. 2017;109:281–8.

    Article  Google Scholar 

  13. Rao RS, Pais AR. Jail-Phish: an improved search engine based phishing detection system. Comput Secur. 2019;1(83):246–67.

    Article  Google Scholar 

  14. Aljofey A, Jiang Q, Qu Q, Huang M, Niyigena JP. An effective phishing detection model based on character level convolutional neural network from URL. Electronics. 2020;9(9):1514.

    Article  Google Scholar 

  15. AlEroud A, Karabatis G. Bypassing detection of URL-based phishing attacks using generative adversarial deep neural networks. In: Proceedings of the sixth international workshop on security and privacy analytics. 2020. pp. 53–60. https://doi.org/10.1145/3375708.3380315.

  16. Wen Y, Wu R, Zhou Z, Zhang S, Yang S, Wallington TJ, et al. A data-driven method of traffic emissions mapping with land use random forest models. Appl Energy. 2022;305: 117916.

    Article  Google Scholar 

  17. Anand R, Sakkari DS. Classification of fake news on Twitter by using Naïve Bayes classifier. In: Ranganathan G, Fernando X, Shi F, El Allioui Y, editors. Soft computing for security applications. Singapore: Springer; 2022. pp. 399–408. https://doi.org/10.1007/978-981-16-5301-8_30.

    Chapter  Google Scholar 

  18. Tanvir Fayaz S, Tejanmayi GS, Kanaka Ruthvi Y, Vijaya Shetty S, Shenoy SU, Bhat G. Prediction of liver patients using machine learning algorithms. In: Shetty NR, Patnaik LM, Nagaraj HC, Hamsavath PN, Nalini N, editors. Emerging research in computing, information, communication and applications. Singapore: Springer; 2022. p. 135–45. https://doi.org/10.1007/978-981-16-1338-8_12.

    Chapter  Google Scholar 

  19. Wang Y, Pan Z, Dong J. A new two-layer nearest neighbor selection method for kNN classifier. Knowl-Based Syst. 2022;235: 107604.

    Article  Google Scholar 

  20. Lin CW, Hong S, Lin M, Huang X, Liu J. Bird posture recognition based on target keypoints estimation in dual-task convolutional neural networks. Ecol Ind. 2022;135: 108506.

    Article  Google Scholar 

  21. Sumant AS, Patil D. Ensemble Feature Subset Selection: Integration of Symmetric Uncertainty and Chi-Square techniques with RReliefF. J Inst Eng (India). 2022. https://doi.org/10.1007/s40031-021-00684-5.

    Article  Google Scholar 

  22. Kharwar AR, Thakor DV. An ensemble approach for feature selection and classification in intrusion detection using extra-tree algorithm. Int J Inf Secur Privacy (IJISP). 2022;16(1):1–21.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saurabh Pal.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Approaches for Artificial Intelligence, Image Processing, IoT and Cloud Applications” guest edited by Bhanu Prakash K N and M Shivakumar.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pandey, M.K., Singh, M.K., Pal, S. et al. Prediction of Phishing Websites Using Stacked Ensemble Method and Hybrid Features Selection Method. SN COMPUT. SCI. 3, 488 (2022). https://doi.org/10.1007/s42979-022-01387-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01387-4

Keywords

Navigation