About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part I

Research Article

Real Time Phishing Detection Using Lexical Analysis and Visual Similarity

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81168-5_15,
        author={A. Gnanesh and Dasa A. Deepesh and Bhargav Hegde and Shreehari Vyasamudri and V. Sarasvathi},
        title={Real Time Phishing Detection Using Lexical Analysis and Visual Similarity},
        proceedings={Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16--17, 2024, Proceedings, Part I},
        proceedings_a={BROADNETS},
        year={2025},
        month={2},
        keywords={Phishing Machine Learning URL structure Lexical Analysis XGBoost Visual Similarity MobileNetV2 Transfer Learning Logo Detection Chrome Extension},
        doi={10.1007/978-3-031-81168-5_15}
    }
    
  • A. Gnanesh
    Dasa A. Deepesh
    Bhargav Hegde
    Shreehari Vyasamudri
    V. Sarasvathi
    Year: 2025
    Real Time Phishing Detection Using Lexical Analysis and Visual Similarity
    BROADNETS
    Springer
    DOI: 10.1007/978-3-031-81168-5_15
A. Gnanesh1,*, Dasa A. Deepesh1, Bhargav Hegde1, Shreehari Vyasamudri1, V. Sarasvathi1
  • 1: PES University
*Contact email: gnaneshanand600@gmail.com

Abstract

Phishing, a form of social engineering, involves deceptive practices to extract sensitive information from individuals. Typically, attackers manipulate their messages to mimic genuine communication from reputable entities like financial institutions, social networks, or online marketplaces. Phishing attempts manifest across various communication channels, encompassing email, text messages, and social media platforms. The acquired sensitive data fuels identity theft and financial fraud, underscoring the importance of vigilance when encountering unsolicited communications or hyperlinks soliciting personal information or immediate action. This paper offers a comprehensive approach to tackle phishing hazards, employing diverse features including URL structure for lexical analysis and screen-shot for visual similarity using transfer learning. Notably, the XGBoostClassifier attains an outstanding accuracy rate of( 96.89 \%). To bolster this, a hybrid approach is adopted, integrating the MobileNet model for visual similarity-based detection. The incorporation of the MobileNet model introduces a visual similarity-based detection layer, augmenting the system’s capabilities. Implemented as a Chrome plug-in, this system dynamically scrutinizes website URLs, promptly alerting users about potential phishing threats. Rigorous testing on real-world phishing websites showcases the method’s robust performance, offering a reliable and user-friendly solution to detect and prevent phishing attacks. The hybrid integration of feature based detection through XGBoostClassifier and visual similarity analysis using MobileNet fortifies the system, elevating its effectiveness in safeguarding against evolving phishing assaults.

Keywords
Phishing Machine Learning URL structure Lexical Analysis XGBoost Visual Similarity MobileNetV2 Transfer Learning Logo Detection Chrome Extension
Published
2025-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-81168-5_15
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL