S. Menaka, Jonnalagadda Harshika, Sarah Philip, Rashi John, N. Bharathiraja, S. Murugesan
{"title":"基于机器学习的集成方法检测钓鱼网站的准确性分析","authors":"S. Menaka, Jonnalagadda Harshika, Sarah Philip, Rashi John, N. Bharathiraja, S. Murugesan","doi":"10.1109/ICAIS56108.2023.10073834","DOIUrl":null,"url":null,"abstract":"Phishing attacks are now one of the prevalent dangers that firms, service providers and internet users must deal with. Rather than targeting software vulnerabilities, it targets human vulnerabilities. It is the act of enticing users to attain their personal data using fake emails and websites. Like how e-commerce sectors are growing, phishing attacks are also developing. Preventing phishing attempts is a critical aspect of protecting online transactions. Since hacktivists, spy agencies and cybercriminals now have a rich field in which they can operate sophisticated phishing attacks, prompt detection of phishing attempts is more critical than ever. To properly respond to various phishing attacks, it is required to gain a thorough understanding of these attacks, and suitable response techniques must be used. The challenges faced in this research is finding the appropriate datasets and Feature extraction prompted the study of several modules, in addition to understanding every module and attaining the desired outcome from it. Machine learning techniques are used to accurately identify phishing attacks before cause harm to a user. Being able to handle the changing nature of phishing attempts and offering an accurate method of classification, it is one of the most practical ways to approach the situation.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analysing the Accuracy of Detecting Phishing Websites using Ensemble Methods in Machine Learning\",\"authors\":\"S. Menaka, Jonnalagadda Harshika, Sarah Philip, Rashi John, N. Bharathiraja, S. Murugesan\",\"doi\":\"10.1109/ICAIS56108.2023.10073834\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing attacks are now one of the prevalent dangers that firms, service providers and internet users must deal with. Rather than targeting software vulnerabilities, it targets human vulnerabilities. It is the act of enticing users to attain their personal data using fake emails and websites. Like how e-commerce sectors are growing, phishing attacks are also developing. Preventing phishing attempts is a critical aspect of protecting online transactions. Since hacktivists, spy agencies and cybercriminals now have a rich field in which they can operate sophisticated phishing attacks, prompt detection of phishing attempts is more critical than ever. To properly respond to various phishing attacks, it is required to gain a thorough understanding of these attacks, and suitable response techniques must be used. The challenges faced in this research is finding the appropriate datasets and Feature extraction prompted the study of several modules, in addition to understanding every module and attaining the desired outcome from it. Machine learning techniques are used to accurately identify phishing attacks before cause harm to a user. Being able to handle the changing nature of phishing attempts and offering an accurate method of classification, it is one of the most practical ways to approach the situation.\",\"PeriodicalId\":164345,\"journal\":{\"name\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIS56108.2023.10073834\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIS56108.2023.10073834","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysing the Accuracy of Detecting Phishing Websites using Ensemble Methods in Machine Learning
Phishing attacks are now one of the prevalent dangers that firms, service providers and internet users must deal with. Rather than targeting software vulnerabilities, it targets human vulnerabilities. It is the act of enticing users to attain their personal data using fake emails and websites. Like how e-commerce sectors are growing, phishing attacks are also developing. Preventing phishing attempts is a critical aspect of protecting online transactions. Since hacktivists, spy agencies and cybercriminals now have a rich field in which they can operate sophisticated phishing attacks, prompt detection of phishing attempts is more critical than ever. To properly respond to various phishing attacks, it is required to gain a thorough understanding of these attacks, and suitable response techniques must be used. The challenges faced in this research is finding the appropriate datasets and Feature extraction prompted the study of several modules, in addition to understanding every module and attaining the desired outcome from it. Machine learning techniques are used to accurately identify phishing attacks before cause harm to a user. Being able to handle the changing nature of phishing attempts and offering an accurate method of classification, it is one of the most practical ways to approach the situation.