Abstract
One of the major challenges in cyber space and Internet of things (IoT) environments is the existence of fake or phishing websites that steal users’ information. A website as a multimedia system provides access to different types of data such as text, image, video, audio. Each type of these data are prune to be used by fishers to perform a phishing attack. In phishing attacks, people are directed to fake pages and their important information is stolen by a thief or phisher. Machine learning and data mining algorithms are the widely used algorithms for classifying websites and detecting phishing attacks. Classification accuracy is highly dependent on the feature selection method employed to choose appropriate features for classification. In this research, an improved spotted hyena optimization algorithm (ISHO algorithm) is proposed to select proper features for classifying phishing websites through support vector machine. The proposed ISHO algorithm outperformed the standard spotted hyena optimization algorithm with better accuracy. In addition, the results indicate the superiority of ISHO algorithm to three other meta-heuristic algorithms including particle swarm optimization, firefly algorithm, and bat algorithm. The proposed algorithm is also compared with a number of classification algorithms proposed before on the same dataset.
Similar content being viewed by others
References
Aldawood H, Skinner G (2019, January) An academic review of current industrial and commercial cyber security social engineering solutions. In: In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp 110–115
Altay B, Dokeroglu T, Cosar A (2018) Context-sensitive and keyword density-based supervised machine learning algorithms for malicious webpage detection. Soft Computing:1–15
Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23:4315–4327
Benavides E, Fuertes W, Sanchez S, Sanchez M (2020) Classification of phishing attack solutions by employing deep learning algorithms: a systematic literature review. In Developments and Advances in Defense and Security:51–64
Dhiman G, Kumar V (2017) Spotted hyena optimizer: a novel bio-inspired based metaheuristic algorithm for engineering applications. Adv Eng Softw 114:48–70
Dhiman, G., & Kumar, V. (2019). Spotted hyena optimizer for solving complex and non-linear constrained engineering problems. In Harmony Search and Nature Inspired Optimization Algorithms, 857-867.
Dua D, Graff C (2019) UCI machine learning repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.
Feng F, Zhou Q, Shen Z, Yang X, Han L, Wang J (2018) The application of a novel neural network in the detection of phishing websites. J Ambient Intell Humaniz Comput:1–15
Jain AK, Gupta BB (2018) A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Humaniz Comput:1–14
Latif, R. M. A., Umer, M., Tariq, T., Farhan, M., Rizwan, O., & Ali, G. (2019, January). A smart Algorithmology for analyzing secure E-banking and E-commerce websites. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 589-596.
Le Page S, Jourdan, G. V., Bochmann, G. V., Flood, J., & Onut, I. V. (2018, May). Using url shorteners to compare phishing and malware attacks. In 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-13.
Mafarja M, Aljarah I, Faris H, Hammouri AI, Ala’M AZ, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286
Nagpal R, Singh P, Garg BP (2020) Dynamically swarm shared mutation based bacterial foraging. Int J Inf Technol 16:1–8
Nair S (2019, May) The roving proxy framework for SMS spam and phishing detection. In: In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp 1–6
Niu N, Xiaosong Z, Guowu Y, Zhiyuan M (2017) Phishing emails detection using CS-SVM. In: IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, pp 1054–1059
Rao RS, Pais AR (2019) Jail-phish: an improved search engine based phishing detection system. Computers & Security 83:246–267
Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl:1–23
Sahingoz OK, Buber E, Demir O, Diri B (2019) Machine learning based phishing detection from URLs. Expert Syst Appl 117:345–357
Salahdine F, Kaabouch N (2019) Social engineering attacks: a survey. Future Internet 11(4):89
Xiao X, Zhang D, Hu G, Jiang H, Xia S (2020) CNN-MHSA: a convolutional neural network and multi-head self-attention combined approach for detecting phishing websites. Neural Netw:303–312
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sabahno, M., Safara, F. ISHO: improved spotted hyena optimization algorithm for phishing website detection. Multimed Tools Appl 81, 34677–34696 (2022). https://doi.org/10.1007/s11042-021-10678-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10678-6