A framework for phishing attack identification using rough set and formal concept analysis

被引:0
|
作者
Syed Siraj Ahmed N. [1 ]
Acharjya D.P. [1 ]
Sanyal S. [2 ]
机构
[1] School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu
[2] Corporate Technology Office, Tata Consultancy Services, Mumbai
关键词
Decision table; Indiscernible; Information system; Phishing attack; Rough set;
D O I
10.1504/IJCNDS.2017.082105
中图分类号
学科分类号
摘要
Convergence of information and communication on technology changed the life of a common man over the last few years. At the same time it increases threats to a common man. In order to overcome these situations lots of research is carried out in the direction network and internet security. In addition identification of various attacks is of great challenge before taking any security measures. Identification of phishing attacks such as fake e-mails or websites is one such critical attack in internetworking. It is an illegal trick game that collects personal information from a legitimate user. The fake e-mails or website looking like a true one and even in the web pages where users are asked to send their personal information may look like a legitimate. Identification of such websites, e-mails is one of great challenge today. To this end, in this paper, we propose a model for identification of phishing attacks and chief attributes that make an object phishing object using rough set and formal concept analysis. The concept is explained with an illustration and followed by a case study. The results obtained show the viability of the proposed research. © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:186 / 212
页数:26
相关论文
共 50 条
  • [31] A Rough Set Multi-Knowledge Extraction Algorithm and Its Formal Concept Analysis
    Zhu, Zhengqiong
    Li, Hui
    Dai, Guangyao
    Abraham, Ajith
    Yang, Wanqing
    2014 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2014), 2014,
  • [32] Formal concept analysis and rough set theory from the perspective of finite topological approximations
    Wolski, M
    TRANSACTIONS ON ROUGH SETS III, 2005, 3400 : 230 - 243
  • [33] Fuzzy and rough formal concept analysis: a survey
    Poelmans, Jonas
    Ignatov, Dmitry I.
    Kuznetsov, Sergei O.
    Dedene, Guido
    INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2014, 43 (02) : 105 - 134
  • [34] Author Profile Identification Using Formal Concept Analysis
    Radvansky, Martin
    Horak, Zdenek
    Kudelka, Milos
    Snasel, Vaclav
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 2013, 188 : 485 - 494
  • [35] Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis
    Acharjya, D. P.
    Ahmed, N. Syed Siraj
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 349 - 374
  • [36] Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis
    D. P. Acharjya
    N. Syed Siraj Ahmed
    Peer-to-Peer Networking and Applications, 2021, 14 : 349 - 374
  • [37] An integration method combining Rough Set Theory with formal concept analysis for personal investment portfolios
    Shyng, Jhieh-Yu
    Shieh, How-Ming
    Tzeng, Gwo-Hshiung
    KNOWLEDGE-BASED SYSTEMS, 2010, 23 (06) : 586 - 597
  • [38] Rough-set concept analysis: Interpreting RS-definable concepts based on ideas from formal concept analysis
    Yao, Yiyu
    INFORMATION SCIENCES, 2016, 346 : 442 - 462
  • [39] A Formal Concept Analysis Approach to Rough Data Tables
    Ganter, Bernhard
    Meschke, Christian
    ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, PROCEEDINGS, 2009, 5908 : 117 - 126
  • [40] A Formal Concept Analysis Approach to Rough Data Tables
    Ganter, Bernhard
    Meschke, Christian
    TRANSACTIONS ON ROUGH SETS XIV, 2011, 6600 : 37 - 61