A framework for phishing attack identification using rough set and formal concept analysis

被引:0
|
作者
Syed Siraj Ahmed N. [1 ]
Acharjya D.P. [1 ]
Sanyal S. [2 ]
机构
[1] School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu
[2] Corporate Technology Office, Tata Consultancy Services, Mumbai
关键词
Decision table; Indiscernible; Information system; Phishing attack; Rough set;
D O I
10.1504/IJCNDS.2017.082105
中图分类号
学科分类号
摘要
Convergence of information and communication on technology changed the life of a common man over the last few years. At the same time it increases threats to a common man. In order to overcome these situations lots of research is carried out in the direction network and internet security. In addition identification of various attacks is of great challenge before taking any security measures. Identification of phishing attacks such as fake e-mails or websites is one such critical attack in internetworking. It is an illegal trick game that collects personal information from a legitimate user. The fake e-mails or website looking like a true one and even in the web pages where users are asked to send their personal information may look like a legitimate. Identification of such websites, e-mails is one of great challenge today. To this end, in this paper, we propose a model for identification of phishing attacks and chief attributes that make an object phishing object using rough set and formal concept analysis. The concept is explained with an illustration and followed by a case study. The results obtained show the viability of the proposed research. © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:186 / 212
页数:26
相关论文
共 50 条
  • [41] Identification of substructures in complex networks using formal concept analysis
    Neto, Sebastiao M.
    Dias, Sergio
    Missaoui, Rokia
    Zarate, Luis
    Song, Mark
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2018, 14 (03) : 281 - 298
  • [42] Set approximations in fuzzy formal concept analysis
    Shao, Ming-Wen
    Liu, Min
    Zhang, Wen-Xiu
    FUZZY SETS AND SYSTEMS, 2007, 158 (23) : 2627 - 2640
  • [43] Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
    Wu, Banghua
    Nazir, Shah
    Mukhtar, Neelam
    COMPLEXITY, 2020, 2020
  • [44] Phishing Detection by determining Reliability Factor using Rough Set Theory.
    Kumar, Anugrah
    Roy, Sanjiban Shekar
    Saxena, Sanklan
    Rawat, Sarvesh S. S.
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 236 - 240
  • [45] Causality measures and analysis: A rough set framework
    Yao, Ning
    Miao, Duoqian
    Pedrycz, Witold
    Zhang, Hongyun
    Zhang, Zhifei
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 136 : 187 - 200
  • [46] A Framework for Identifying Reusable Software Components Using Formal Concept Analysis
    Hamza, Haitham S.
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 813 - 818
  • [47] A New Case-Based Classifier System Using Rough Formal Concept Analysis
    Pattaraintakorn, Puntip
    Boonjing, Veera
    Tadrat, Jirapond
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 645 - +
  • [48] Concept analysis via rough set and AFS algebra
    Wang, Lidong
    Liu, Xiaodong
    INFORMATION SCIENCES, 2008, 178 (21) : 4125 - 4137
  • [49] Formal Concept Analysis in relational database and rough relational database
    Jiang, Feng
    Sui, Yuefei
    Cao, Cungen
    FUNDAMENTA INFORMATICAE, 2007, 80 (04) : 435 - 451
  • [50] Identification of Ontological Relations in Domain Corpus Using Formal Concept Analysis
    Tovar, Mireya
    Pinto, David
    Montes, Azucena
    Gonzalez, Gabriel
    Vilarino, Darnes
    ENGINEERING LETTERS, 2015, 23 (02) : 72 - 76