Loading [MathJax]/extensions/MathMenu.js
Efficient Phishing Detection and Prevention Using Support Vector Machine (SVM) Algorithm | IEEE Conference Publication | IEEE Xplore

Efficient Phishing Detection and Prevention Using Support Vector Machine (SVM) Algorithm


Abstract:

Phishing issues influence the electronic trade in light of the fact that web-based clients trust the Internet climate less. Phishers use procedures that advance to bait o...Show More

Abstract:

Phishing issues influence the electronic trade in light of the fact that web-based clients trust the Internet climate less. Phishers use procedures that advance to bait online clients, making new phishing sites and spreading messages that attempt to persuade Internet clients to follow deceitful connections to get to their sites. Phishing sites utilize refined procedures that direct internet-based clients to open another page, which has not yet been added to the boycott. A phishing assault that utilizes these new sorts of strategies is known as a zero-day assault. Against phishing techniques can be isolated into specialized or non-specialized arrangements. Nontechnical arrangements used to safeguard the client from phishing assault rely upon utilizing mindfulness and preparing projects to show online customers how to perceive phishing messages and sites. Specialized arrangements, in any case, rely upon building recognition and security models in view of preparing datasets.
Date of Conference: 08-09 April 2023
Date Added to IEEE Xplore: 31 May 2023
ISBN Information:

ISSN Information:

Conference Location: Bhopal, India
References is not available for this document.

I. Introduction

A social engineering attack known as ‘‘phishing’’ attempts to exploit vulnerabilities in system operations caused by system users. For instance, even though a system is technically safe enough to prevent credential theft, uneducated end users may provide their credentials if an attacker requests that they do so via a particular Hypertext Transfer Protocol (HTTP) connection, putting the security of the system at risk. Furthermore, intruders could create considerably more convincing socially engineered communications by exploiting technical flaws (such as DNS cache poisoning), which allows them to leverage real but faked domain names rather than alternative ones. Due to this, phishing attempts are a multi-layered problem that would require technical solutions in order to effectively mitigate.

Select All
1.
S.-J. Bu and S.-B. Cho, "Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection", Electronics, vol. 10, no. 12, pp. 1492, Jun. 2021.
2.
A. R. Pais, V. S. Rathour, R. S. Rao and M. Somesha, Efficient deep learning techniques for the detection of phishing websites, vol. 45, no. 1, Jun. 2020.
3.
K. T. Lwin, M. A. Hossain and M. A. Adebowale, "Intelligent phishing detection scheme using deep learning algorithms", J. Enterprise Inf. Manage. to be published.
4.
T. S. Ranaweera, K. Y. Abeywardena, R. A. H. DevduniePabasara, D. N. Atimorathanna and J. R. Perera, "NoFish; total anti-phishing protection system", Proc. 2nd Int. Conf. Advancements Comput, Dec. 2020.
5.
H. Singh, A. Jain and S. Maurya, "Browser extension based hybrid antiphishing framework using feature selection", Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 11, pp. 1-10, 2019.
6.
A. Sarma and B. Banik, "Phishing URL detection system based on URL features using SVM", International Journal of Electronics and Applied Research., vol. 5, no. 2, pp. 40-55, 2018.
7.
PhishTank data archives, 02 2018, [online] Available: https://www.phishtank.com/.
8.
K. M. Sundaram, R. Sasikumar, A. S. Meghana, A. Anuja and C. Praneetha, "Detecting phishing websites using an efficient feature `based machine learning framework", Re-vistaGestãoInovaĉãoe Tecnologias, vol. 11, no. 2, pp. 2106-2112, Jun. 2021.
9.
F.D. Abdi and L. Wenjuan, "Malicious URL Detection Using Convolutional Neural Network", International Journal of Computer Science Engineering and Information Technolo-gy, vol. 7, no. 6, pp. 01-08.
10.
O. Abiodun, A. S. Sodiya, S. O. Kareem, M. G. Hr, M. V. Adithya and S. Vinay, "Linkcalculator-An efficient link-based phishing detection tool", Malaysia, vol. 4, no. 2, pp. 37-44, Oct. 2020.
11.
G. Parthasarathy, M. Vishal, L.S. Kesaragopp and S. Manigandan, "Analysis of machine learning algorithm for prediction of heart disease", International Journal of Advanced Research in Computer Science, 2020.
12.
H. Garg, B. Sharma, S. Shekhar and R. Agarwal, "Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network", Multimedia Tools and Applications, vol. 81, pp. 26873-26888, 2022.
13.
S. Hariharan, S, D, M. D. Angeline, R. Perumal and I. Samuel Peter James, "Analyzing the Significance of Learner Emotions Using Data Analytics", Encyclopedia of Data Science and Machine Learning, pp. 2594-2616, 2023, [online] Available: https://doi.org/10.4018/978-1-7998-9220-5.ch156.
14.
J. Rajeswari and S. Hariharan, "Personalized Search Recommender System: State of Art Experimental Results and Investigations", International Journal of Education and Management Engineering, vol. 6, no. 3, pp. 1-8, 2016.

Contact IEEE to Subscribe

References

References is not available for this document.