Machine learning models for phishing detection from TLS traffic

dc.contributor.authorKumar, M.
dc.contributor.authorKondaiah, C.
dc.contributor.authorPais, A.R.
dc.contributor.authorRao, R.S.
dc.date.accessioned2026-02-05T13:17:23Z
dc.date.issued2023
dc.description.abstractPhishing is a fraudulent tactic for attackers to obtain victims personal information, such as passwords, account details, credit card details, and other sensitive information. Existing anti-phishing detection methods using at the application layer and cannot be applied at the transport layer. A novel machine learning (ML) based phishing detection technique from transport layer security (TLS) 1.2 and TLS 1.3 encrypted traffic without decryption is proposed in this paper. Our proposed model detects phishing URLs at the transport layer and classifies them as legitimate or phishing. The features are extracted from TLS 1.2 and TLS 1.3 traffic, and phishing detection is performed using ML algorithms based on the extracted features. The datasets for legitimate and phishing sites are created using features derived from TLS 1.2 and TLS 1.3 traffic. According to the experimental results, the proposed model effectively detects phishing URLs in encrypted traffic. The proposed model achieves an accuracy of 93.63% for Random Forest (RF), 95.07% for XGBoost (XGB), and the highest accuracy of 95.40% for Light GBM (LGBM). © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
dc.identifier.citationCluster Computing, 2023, Vol.26, 5, p. 3263-3277
dc.identifier.issn13867857
dc.identifier.urihttps://doi.org/10.1007/s10586-023-04042-6
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/28277
dc.publisherSpringer
dc.subjectAnti-phishing
dc.subjectML
dc.subjectPhishing
dc.subjectTLS 1.2
dc.subjectTLS 1.3
dc.subjectURL
dc.titleMachine learning models for phishing detection from TLS traffic

Files

Collections