TY - JOUR TT - DETECTING PHISHING WEBSITES USING SUPPORT VECTOR MACHINE ALGORITHM AU - Aksu, Dogukan AU - Abdulwakil, Abdullah AU - Aydin, M. Ali PY - 2017 DA - June DO - 10.17261/Pressacademia.2017.582 JF - PressAcademia Procedia JO - PAP PB - Suat TEKER WT - DergiPark SN - 2459-0762 SP - 139 EP - 142 VL - 5 IS - 1 KW - Cyber security KW - phishing KW - machine learning KW - support vector machine KW - matlab N2 - Cybersecurityis one of the most important areas which aims to protect computers or computersystems, networks, programs and data from an attack such as; financial systems,biometric security systems, military systems, personal information securityetc. Nowadays, there are a lot of rule-based phishing detection systems whichare created to help people who can't understand which URL is real and which oneis fake URL address. This paper proposes a method with supervised machinelearning that classifies the URLs to legitimate and phishing. By using supportvector machine (SVM) classification, a machine-learning algorithm, with anMATLAB-based computer program to give a warning message to the users about thereliability of the web page. In this paper, phishing detection system isimplemented with SVM to avoid the internet users from becoming a victim ofphishers to do not lose financial and personal information. CR - Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based Associative Classification data mining. Expert Systems with Applications, 5948-5959. CR - Akanbi, O. A., Amiri, I. S., & Fezaldehkordi, E. (2015). A Machine Learning Approach to Phishing Detection and Defense. ELSEVIER. CR - Anti-Phishing Working Group, J. (2017, Feb. 23). Phishing Activity Trends Report, 4th Quarter 2016. Retrieved March 10, 2017, from APWG: https://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf CR - Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning. 20(3): 273-297. CR - Fang, X., Koceja, N., Zhan, J., Dozier, G., & Dipankar, D. (2012). An Artificial Immune System for Phishing Detection. IEEE World Congress on Computational Intelligence. CR - Jain, A. K., & Gupta, B. B. (2016). Comparative Analysis of Features Based Machine Learning Approaches for Phishing Detection. International Conference on Computing for Sustainable Global Development (INDIACom), (pp. 2125-2130). CR - Liu, J., & Ye, Y. (2001). Introduction to e-commerce agents: marketplace solutions, security issues, and supply and demand. In E-commerce agents, marketplace solutions, security issues, and supply and demand, 1-6. CR - Phishtank. (n.d.). Retrieved February 9, 2017, from OpenDNS: http://www.phishtank.com CR - Shouval, R., Bondi, O., Mishan, H., Shimoni, A., Unger, R., & Nagler, A. (2014). Application of machine learning algorithms for clinical predictive modeling: a data-mining approach. Bone Marrow Transplantation, 49, 332–337. CR - Xiang, G., Hong, J., Rose, C. P., & Cranor, L. (2011). Cantina+: A feature rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security (TTSSEC), 14(2): p. 21. CR - Zhang, Y., Hong, J., & Cranor, L. (2007). Cantina: a content-based approach to detecting phishing web sites. Proceedings of the 16th international conference on World Wide Web. UR - https://doi.org/10.17261/Pressacademia.2017.582 L1 - https://dergipark.org.tr/en/download/article-file/392435 ER -