Secure Browse: AI-Powered Phishing Defense for Browsers
DOI:
https://doi.org/10.47941/ijce.1921Keywords:
Phishing Defense, Machine Learning Classification, Web Server Architecture, Ensemble ModelAbstract
Purpose: With the rising threat of phishing attacks exploiting user naivety, this report introduces a novel approach to bolster web security. Traditional rule-based systems and existing solutions fall short in addressing sophisticated phishing attempts. The proposed solution entails a Chromium-based browser extension that leverages machine learning classification techniques.
Methodology: A Python web server, utilizing decision trees, k- nearest neighbors, and random forests, assesses the legitimacy of a given URL. The extension communicates with the server, providing real-time notifications to users when visiting potential phishing sites.
Findings: Experimental results demonstrate the effectiveness of the ensemble model with an accuracy of 90.68%, marking a significant improvement over rule-based alternatives.
Unique contribution to theory, policy and practice: Future work includes refining models, incorporating user feedback, and expanding the application to diverse platforms and contexts.
Downloads
References
et al, M.: Phishing websites data set by uci, https://archive.ics.uci.edu/ml/datasets/Phishing+Websites
Acra, B.: Blue arca anti-phishing extension, https://chrome.google.com/webstore/detail/blue-arca-anti-phishing-e/
Cloudphish: Cloudphish anti-phishing extension, https://chrome.google.com/webstore/detail/cloudphish-anti-phishing/fcahokjdmffdhglnlhgbceafccfdfjkd?hl=en
Initiative, O.P.: Open pagerank api, https://www.domcop.com/openpagerank/
Lab, T.C.: Test lists, https://github.com/citizenlab/test-lists
Majestic: Majestic top 1 million websites, https://majestic.com/reports/majestic-million
Moghimi, M.: Phishdetector – True phishing detection, https://chrome.google.com/webstore/detail/phishdetector-true-phishi/kgecldbalfgmgelepbblodfoogmjdgmj
Proofpoint: Threat report: 2021 state of the phish report, https://www.proofpoint.com/us/resources/threat-reports/state-of-phish
Retruster: Retruster phishing protection, https://chrome.google.com/webstore/detail/retruster-phishing-protec/akcpbmbdplmbhlpeglpbghnkcbhiapil?hl=en
Vrbančič, G.: Datasets for phishing websites detection, Phishing Websites Dataset - Mendeley Data
Zuelsdorf, A.: Phishing boat, https://chrome.google.com/webstore/detail/phishing-boat/ljaiihgfejfaggbjfildfnjdckomlfop?hl=en
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Santosh Kumar Kande
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.