To read this content please select one of the options below:

MMSPhiD: a phoneme based phishing verification model for persons with visual impairments

Gunikhan Sonowal (Department of Computer Science, Pondicherry University, Pondicherry, India)
KS Kuppusamy (Department of Computer Science, Pondicherry University, Pondicherry, India)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 12 November 2018

380

Abstract

Purpose

This paper aims to propose a model entitled MMSPhiD (multidimensional similarity metrics model for screen reader user to phishing detection) that amalgamates multiple approaches to detect phishing URLs.

Design/methodology/approach

The model consists of three major components: machine learning-based approach, typosquatting-based approach and phoneme-based approach. The major objectives of the proposed model are detecting phishing URL, typosquatting and phoneme-based domain and suggesting the legitimate domain which is targeted by attackers.

Findings

The result of the experiment shows that the MMSPhiD model can successfully detect phishing with 99.03 per cent accuracy. In addition, this paper has analyzed 20 leading domains from Alexa and identified 1,861 registered typosquatting and 543 phoneme-based domains.

Research limitations/implications

The proposed model has used machine learning with the list-based approach. Building and maintaining the list shall be a limitation.

Practical implication

The results of the experiments demonstrate that the model achieved higher performance due to the incorporation of multi-dimensional filters.

Social implications

In addition, this paper has incorporated the accessibility needs of persons with visual impairments and provides an accessible anti-phishing approach.

Originality/value

This paper assists persons with visual impairments on detection phoneme-based phishing domains.

Keywords

Citation

Sonowal, G. and Kuppusamy, K. (2018), "MMSPhiD: a phoneme based phishing verification model for persons with visual impairments", Information and Computer Security, Vol. 26 No. 5, pp. 613-636. https://doi.org/10.1108/ICS-12-2017-0091

Publisher

:

Emerald Publishing Limited

Copyright © 2018, Emerald Publishing Limited

Related articles