Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

ISHO: improved spotted hyena optimization algorithm for phishing website detection

  • 1174: Futuristic Trends and Innovations in Multimedia Systems Using Big Data, IoT and Cloud Technologies (FTIMS)
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

One of the major challenges in cyber space and Internet of things (IoT) environments is the existence of fake or phishing websites that steal users’ information. A website as a multimedia system provides access to different types of data such as text, image, video, audio. Each type of these data are prune to be used by fishers to perform a phishing attack. In phishing attacks, people are directed to fake pages and their important information is stolen by a thief or phisher. Machine learning and data mining algorithms are the widely used algorithms for classifying websites and detecting phishing attacks. Classification accuracy is highly dependent on the feature selection method employed to choose appropriate features for classification. In this research, an improved spotted hyena optimization algorithm (ISHO algorithm) is proposed to select proper features for classifying phishing websites through support vector machine. The proposed ISHO algorithm outperformed the standard spotted hyena optimization algorithm with better accuracy. In addition, the results indicate the superiority of ISHO algorithm to three other meta-heuristic algorithms including particle swarm optimization, firefly algorithm, and bat algorithm. The proposed algorithm is also compared with a number of classification algorithms proposed before on the same dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Aldawood H, Skinner G (2019, January) An academic review of current industrial and commercial cyber security social engineering solutions. In: In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp 110–115

    Chapter  Google Scholar 

  2. Altay B, Dokeroglu T, Cosar A (2018) Context-sensitive and keyword density-based supervised machine learning algorithms for malicious webpage detection. Soft Computing:1–15

  3. Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23:4315–4327

    Article  Google Scholar 

  4. Benavides E, Fuertes W, Sanchez S, Sanchez M (2020) Classification of phishing attack solutions by employing deep learning algorithms: a systematic literature review. In Developments and Advances in Defense and Security:51–64

  5. Dhiman G, Kumar V (2017) Spotted hyena optimizer: a novel bio-inspired based metaheuristic algorithm for engineering applications. Adv Eng Softw 114:48–70

    Article  Google Scholar 

  6. Dhiman, G., & Kumar, V. (2019). Spotted hyena optimizer for solving complex and non-linear constrained engineering problems. In Harmony Search and Nature Inspired Optimization Algorithms, 857-867.

  7. Dua D, Graff C (2019) UCI machine learning repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.

  8. Feng F, Zhou Q, Shen Z, Yang X, Han L, Wang J (2018) The application of a novel neural network in the detection of phishing websites. J Ambient Intell Humaniz Comput:1–15

  9. Jain AK, Gupta BB (2018) A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Humaniz Comput:1–14

  10. Latif, R. M. A., Umer, M., Tariq, T., Farhan, M., Rizwan, O., & Ali, G. (2019, January). A smart Algorithmology for analyzing secure E-banking and E-commerce websites. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 589-596.

  11. Le Page S, Jourdan, G. V., Bochmann, G. V., Flood, J., & Onut, I. V. (2018, May). Using url shorteners to compare phishing and malware attacks. In 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13.

  12. Mafarja M, Aljarah I, Faris H, Hammouri AI, Ala’M AZ, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286

    Article  Google Scholar 

  13. Nagpal R, Singh P, Garg BP (2020) Dynamically swarm shared mutation based bacterial foraging. Int J Inf Technol 16:1–8

    Google Scholar 

  14. Nair S (2019, May) The roving proxy framework for SMS spam and phishing detection. In: In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp 1–6

    Google Scholar 

  15. Niu N, Xiaosong Z, Guowu Y, Zhiyuan M (2017) Phishing emails detection using CS-SVM. In: IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, pp 1054–1059

    Google Scholar 

  16. Rao RS, Pais AR (2019) Jail-phish: an improved search engine based phishing detection system. Computers & Security 83:246–267

    Article  Google Scholar 

  17. Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl:1–23

  18. Sahingoz OK, Buber E, Demir O, Diri B (2019) Machine learning based phishing detection from URLs. Expert Syst Appl 117:345–357

    Article  Google Scholar 

  19. Salahdine F, Kaabouch N (2019) Social engineering attacks: a survey. Future Internet 11(4):89

    Article  Google Scholar 

  20. Xiao X, Zhang D, Hu G, Jiang H, Xia S (2020) CNN-MHSA: a convolutional neural network and multi-head self-attention combined approach for detecting phishing websites. Neural Netw:303–312

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatemeh Safara.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sabahno, M., Safara, F. ISHO: improved spotted hyena optimization algorithm for phishing website detection. Multimed Tools Appl 81, 34677–34696 (2022). https://doi.org/10.1007/s11042-021-10678-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10678-6

Keywords