Phishing Web Sites based Detection and Removal using Machine Learning

Nilam Sachin Patil

Abstract


Internet is an important a part of our life. Web users will be affected from completely different types of cyber threats. Therefore cyber threats could attack financial informa- tion, personal data, online banking and e-commerce. Phishing could be a form of cyber threats that’s targeting to urge personal information like credit cards data and Social Security numbers. There‘s not a selected solution that may sight whole phishing attacks. During this study, we  projected  an  intelligent  model for detecting phishing websites supported Extreme Learning Machine. Forms of websites are completely different in terms of their options. Hence, we tend to should use a selected web content options set to forestall phishing attacks. So these anti phishing techniques are largely machine learning primarily based within which completely different options are used that are extracted from numerous sources. During this paper, we present the survey of fraud web site detection approaches.


Full Text:

PDF

References


G. Spanos and L. Angelis, ”The impact of information security events to the stock market: A systematic literature review”, Computers Security, 58, pp.216-229, 2016.

M. Aburrous, M. Hossain, K. Dahal and F. Thabtah, ”Intelligent phishing detection system for ebanking using fuzzy data mining”, Expert Systems with Applications, 37(12), pp.7913-7921, 2010.

N. Abdelhamid, A. Ayesh and F. Thabtah, ”Phishing detection based As- sociative Classification data mining”, Expert Systems with Applications, 41(13), pp.5948-5959, 2014.

S. Wu, P. Wang, X. Li and Y. Zhang, ”Effective detection of android malware based on the usage of data flow APIs and machine learning”, Information and Software Technology, 75, pp.17-25, 2016.

R. M. Mohammad, F. Thabtah, L. McCluskey, Intelligent Rule-based Phishing Websites Classification, IET Information Security, vol. 8(3), pp. 153-160, 2014.

H. Shahriar and M. Zulkernine, ”Trustworthiness testing of phishing web- sites: A behaviour model-based approach”, Future Generation Computer Systems, 28(8), pp.1258-1271, 2012.

R. M. Mohammad, F. Thabtah and L. McCluskey, ”Tutorial and critical analysis of phishing websites methods”, Computer Science Review, 17, pp.1-24, 2015.

M. Alsharnouby, F. Alaca and S. Chiasson, ”Why phishing still works: User strategies for combating phishing attacks”, International Journal of Human-Computer Studies, 82, pp.69-82,

H. Huang, S. Zhong, J. Tan, Browser-side countermeasures for deceptive phishing attack, Fifth International Conference on Information Assurance and Security IAS’09, vol. 1, pp. 352-355, IEEE, 2009.

M. He, S.J. Horng, P. Fan, M.K. Khan, R.S. Run, J.L. Lai, R.J. Chen, Sutanto, An Efficient Phishing Webpage Detector, Expert Systems with Applications, vol. 38(10), pp. 12018-12027, 2011.

P. A. Barraclough, M. A. Hossain, M. A. Tahir, G. Sexton, N. Aslam, Intelligent Phishing Detection and Protection Scheme for Online Trans- actions, Expert Systems with Applications, vol. 40(11), pp. 4697- 4706, 2013


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology