Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach

Author(s):  
Mohammed Mahmood Ali ◽  
Lakshmi Rajamani
Author(s):  
Huda Yousif Kadhim ◽  
Karim Hashim Al-saedi ◽  
Mustafa Dhiaa Al-Hassani

<strong>Abstract</strong>— The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the process of trying to steal user information over the Internet by claiming they are a trusted entity and thus access and steal the victim's data(user name, password and credit card details). Consequently, the need for mobile phishing detection system has become an urgent need. And this is what we are attempting to introduce in this paper, where we introduce a system to detect phishing websites on Android phones. That predicts and prevents phishing websites from deceiving users, utilizing data mining techniques to predict whether a website is phishing or not, relying on a set of factors (URL based features, HTML based features and Domain based features). The results shows system effectiveness in predicting phishing websites with 97% as prediction accuracy.


2018 ◽  
Author(s):  
Nikita Gawade ◽  
Sayali Mundekar ◽  
Nilam Vare ◽  
Ruchi Gada ◽  
Smita Bansod

2004 ◽  
Vol 4 (4) ◽  
pp. 316-328 ◽  
Author(s):  
Carol J. Romanowski , ◽  
Rakesh Nagi

In variant design, the proliferation of bills of materials makes it difficult for designers to find previous designs that would aid in completing a new design task. This research presents a novel, data mining approach to forming generic bills of materials (GBOMs), entities that represent the different variants in a product family and facilitate the search for similar designs and configuration of new variants. The technical difficulties include: (i) developing families or categories for products, assemblies, and component parts; (ii) generalizing purchased parts and quantifying their similarity; (iii) performing tree union; and (iv) establishing design constraints. These challenges are met through data mining methods such as text and tree mining, a new tree union procedure, and embodying the GBOM and design constraints in constrained XML. The paper concludes with a case study, using data from a manufacturer of nurse call devices, and identifies a new research direction for data mining motivated by the domains of engineering design and information.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


Edulib ◽  
2018 ◽  
Vol 8 (2) ◽  
pp. 194
Author(s):  
Lilis Syarifah ◽  
Imas Sukaesih Sitanggang ◽  
Pudji Muljono

The thesis is student study report which is accomplished as a requirement of graduation for Master program. Selecting study’s topic and advisors influence implementation of the study. Therefore, study’s topic is able to improve academic institution quality, however a large number of thesis documents on the repository cause difficulty to get information related to advisor’s expertness and the frequent or rare topic is former studied. Association rule mining can be used to mine information on the related item. This study aims to analyze advising patterns system in Master program on Agriculture based on supervisors and their topic research on metadata thesis of IPB repository and text documents of summary using data mining approach. The datas were collected from the repository of Bogor Agricultural University website and processed using R language programming. Pattern result of the reseach were that the most popular association on supervisor was occurred at support value of 0.00793 or equivalent to 7 theses and four popular topics were Botanical insecticide, Global warming, Upland Rice, and Land Use Change. The analysis result could be useful information to be reference or suggest future research or appropriate supervisor among agricultural.


2013 ◽  
Vol 4 (4) ◽  
pp. 113-126 ◽  
Author(s):  
Usukhbayar Baldangombo ◽  
Nyamjav Jambaljav ◽  
Shi-Jinn Horng

Sign in / Sign up

Export Citation Format

Share Document