PREDICTION OF PHISHING WEBSITE USING MACHINELEARNING

被引:0
作者
Kavitha, R. [1 ]
Priyanka, K. [1 ]
Anitha, M. [2 ]
Deepa, R. [2 ]
机构
[1] Prince Dr K Vasudevan Coll Engn & Technol, Sci Engn, Comp, Chennai, Tamil Nadu, India
[2] Prince Dr K Vasudevan Coll Engn & Technol, Comp Sci Engn, Chennai, Tamil Nadu, India
关键词
Phishing; Personal information; Machine Learning; Malicious links;
D O I
10.9756/INTJECSE/V14I5
中图分类号
G76 [特殊教育];
学科分类号
040109 ;
摘要
Phishing attack is a simplest way to obtain sensitive information from innocent users. The Internet has become an indispensable part of our life, However, It also has provided opportunities to anonymously perform malicious activities like Phishing. Phishers try to deceive their victims by social engineering or creating mockup websites to steal information such as account ID, username, password from individuals and organizations. Although many methods have been proposed to detect phishing websites, Phishers have evolved their methods to escape from these detection methods.Phishes use the websites which are visually and semantically similar to those real websites. One of the most successful methods for detecting these malicious activities is Machine Learning. Phishing is popular among attackers, since it is easier to trick someone into clicking a malicious link which seems legitimate than trying to break through a computer's defense systems.This is because most Phishing attacks have some common characteristics which can be identified by machine learning methods.Decision Tree, random forest and Support vector machine algorithms are used to detect phishing websites.we compared the results of multiple machine learning methods for predicting phishing websites.
引用
收藏
页码:418 / 423
页数:6
相关论文
共 7 条
[1]  
Desai A, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P1432, DOI 10.1109/RTEICT.2017.8256834
[2]  
Hossain M.A, MODELLING INTELLIGEN
[3]  
Machado L, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA)
[4]   Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings [J].
Neupane, Ajaya ;
Saxena, Nitesh ;
Maximo, Jose Omar ;
Kana, Rajesh .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :1970-1983
[5]   Anomaly based web phishing page detection [J].
Pan, Ying ;
Ding, Xuhua .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :381-+
[6]  
Sung Andrew H., FUZZY DATA MINING
[7]  
Zhang X, 2017, IEEE INT CONF BIG DA, P1063, DOI 10.1109/BigData.2017.8258030