Intrusion detection based on phishing detection with machine learning

被引:0
|
作者
Jayaraj R. [1 ]
Pushpalatha A. [2 ]
Sangeetha K. [3 ]
Kamaleshwar T. [4 ]
Udhaya Shree S. [5 ]
Damodaran D. [6 ]
机构
[1] Data Science and Business Systems, School of Computing, SRM Institute of Science and Technology, Kattankulathur, TN, Chennai
[2] M.Tech Computer Science and Engineering, Sri Krishna College of Engineering and Technology, TN, Coimbatore
[3] Department of Computer Science and Engineering, Panimalar Engineering College, Tamil Nadu, Chennai
[4] Department of Computer Science and Engineering, Vel Tech Dr. Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, TN, Chennai
[5] Department of Computer Science and Engineering, Alpha College of Engineering and Technology, Puducherry
[6] VITBS, Vellore Institute of Technology, Chennai Campus, TN
来源
Measurement: Sensors | 2024年 / 31卷
关键词
Cyber attack; Intrusion detection; CDF-G; Machine learning; Phishing detection;
D O I
10.1016/j.measen.2023.101003
中图分类号
学科分类号
摘要
Machine learning technique which uses artificial neural networks to learn representations. Phishing is a form of fraud in which the attacker tries to learn credential information from the websites. Web phishing is to steal sensitive information such as usernames, passwords and credit card details by way of impersonating a authorized entity. The Hybrid Ensemble Feature Selection is a new feature selection method for machine learning-based phishing detection systems (HEFS). The first step of HEFS involves using a novel Cumulative Distribution Function gradient (CDF-g) algorithm to generate primary feature subsets, which are then fed into a data perturbation ensemble to generate secondary feature subsets. We present the results of our approach and compare them to a few previous studies, with the paper focusing primarily on phishing urls for detecting the unauthorised one by using phishing detection method. © 2023
引用
收藏
相关论文
共 50 条
  • [1] Machine learning based phishing detection from URLs
    Sahingoz, Ozgur Koray
    Buber, Ebubekir
    Demir, Onder
    Diri, Banu
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 117 : 345 - 357
  • [2] Phishing Website Detection Based on Machine Learning: A Survey
    Singh, Charu
    Meenu
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 398 - 404
  • [3] Spear Phishing Emails Detection Based on Machine Learning
    Ding, Xiong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Qiuyun
    Xin, Liling
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 354 - 359
  • [4] Machine learning-based phishing attack detection
    Hossain S.
    Sarma D.
    Chakma R.J.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (09): : 378 - 388
  • [5] Machine Learning-Based Phishing Attack Detection
    Hossain, Sohrab
    Sarma, Dhiman
    Chakma, Rana Joyti
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 378 - 388
  • [6] Machine Learning Based Phishing Web Sites Detection
    Huu Hieu Nguyen
    Duc Thai Nguyen
    AETA 2015: RECENT ADVANCES IN ELECTRICAL ENGINEERING AND RELATED SCIENCES, 2016, 371 : 123 - 131
  • [7] Intrusion detection method based on machine learning
    Tian, Xin-Guang
    Gao, Li-Zhi
    Zhang, Er-Yang
    Tongxin Xuebao/Journal on Communications, 2006, 27 (06): : 108 - 114
  • [8] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [9] Intrusion detection system based on machine learning
    Wang, Xu-Ren
    Xu, Rong-Sheng
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (14): : 107 - 108
  • [10] A Machine-learning based Unbiased Phishing Detection Approach
    Shirazi, Hossein
    Zweigle, Landon
    Ray, Indrakshi
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 423 - 430