Phishing Detection Using Significant Feature Selection

D. Goswami, Manali Shukla, A. Chaturvedi
{"title":"Phishing Detection Using Significant Feature Selection","authors":"D. Goswami, Manali Shukla, A. Chaturvedi","doi":"10.1109/CSNT48778.2020.9115782","DOIUrl":null,"url":null,"abstract":"Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT48778.2020.9115782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.
使用显著特征选择的网络钓鱼检测
在全球范围内,网络攻击的增长正在迅速增加。为这些攻击提供预防措施对专家来说是一个巨大的挑战。入侵者不断采用新的方法和技术来实现他们的恶意目标。网络钓鱼在网络攻击领域占据主导地位,已成为攻击者的一种武器。在本文中,我们给出了两种算法方法来解决具有减少属性数的网络钓鱼识别问题。它使这种方法简单而有效。第一种算法根据统一的资源定位器为所有属性分配权重。我们采用了各种分析机制来识别所选属性的重要作用,以用于网络钓鱼识别。第二种方法将前者的输出作为输入,并将统一资源定位器标记为网络钓鱼或非网络钓鱼。实验结果表明,与现有的网络钓鱼检测算法相比,本文提出的网络钓鱼检测方法具有较高的准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信