Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa
{"title":"Evaluation of Phishing Techniques Based on Machine Learning","authors":"Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa","doi":"10.1109/ICCS45141.2019.9065639","DOIUrl":null,"url":null,"abstract":"Phishing sites is the major problems for online security challenges because of large number of online transactions is done every day. The objective of the paper is to do survey about the phishing: A social attack and its detection and to make aware of the users who doesn’t know about this major attack as many of them are still falling in the trap. Most of the users are unaware about this problem; they unknowingly fill many forms that belong to phishing website which are hidden. This leads to the leaking of sensitive information of the victim. This study also gives brief knowledge about several machine learning techniques such as kNN Algorithm, Naïve Bayes, Decision Tree, Support Vector Machines, Neural Network and Random Forest algorithm for predicting phishing sites.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Phishing sites is the major problems for online security challenges because of large number of online transactions is done every day. The objective of the paper is to do survey about the phishing: A social attack and its detection and to make aware of the users who doesn’t know about this major attack as many of them are still falling in the trap. Most of the users are unaware about this problem; they unknowingly fill many forms that belong to phishing website which are hidden. This leads to the leaking of sensitive information of the victim. This study also gives brief knowledge about several machine learning techniques such as kNN Algorithm, Naïve Bayes, Decision Tree, Support Vector Machines, Neural Network and Random Forest algorithm for predicting phishing sites.