{"title":"使用显著特征选择的网络钓鱼检测","authors":"D. Goswami, Manali Shukla, A. Chaturvedi","doi":"10.1109/CSNT48778.2020.9115782","DOIUrl":null,"url":null,"abstract":"Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Phishing Detection Using Significant Feature Selection\",\"authors\":\"D. Goswami, Manali Shukla, A. Chaturvedi\",\"doi\":\"10.1109/CSNT48778.2020.9115782\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.\",\"PeriodicalId\":131745,\"journal\":{\"name\":\"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT48778.2020.9115782\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT48778.2020.9115782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Phishing Detection Using Significant Feature Selection
Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.