Secure Featurization and Applications to Secure Phishing Detection

2021 ◽  
Author(s):  
Akash Shah ◽  
Nishanth Chandran ◽  
Mesfin Dema ◽  
Divya Gupta ◽  
Arun Gururajan ◽  
...  
Keyword(s):  
2018 ◽  
Author(s):  
Nikita Gawade ◽  
Sayali Mundekar ◽  
Nilam Vare ◽  
Ruchi Gada ◽  
Smita Bansod

2019 ◽  
Author(s):  
Arvind Abraham ◽  
Gilad Gressel ◽  
Krishnashree Achuthan

The objective of this undertaking is to apply neural systems to phishing email recognition and assess the adequacy of this methodology. We structure the list of capabilities, process the phishing dataset, and execute the Neural Network frameworks. we analyze its exhibition against that of other real Artificial Intelligence Techniques – DT , K-nearest , NB and SVM machine.. The equivalent dataset and list of capabilities are utilized in the correlation. From the factual examination, we infer that Neural Networks with a proper number of concealed units can accomplish acceptable precision notwithstanding when the preparation models are rare. Additionally, our element determination is compelling in catching the qualities of phishing messages, as most AI calculations can yield sensible outcomes with it.


: In this era of Internet, the issue of security of information is at its peak. One of the main threats in this cyber world is phishing attacks which is an email or website fraud method that targets the genuine webpage or an email and hacks it without the consent of the end user. There are various techniques which help to classify whether the website or an email is legitimate or fake. The major contributors in the process of detection of these phishing frauds include the classification algorithms, feature selection techniques or dataset preparation methods and the feature extraction that plays an important role in detection as well as in prevention of these attacks. This Survey Paper studies the effect of all these contributors and the approaches that are applied in the study conducted on the recent papers. Some of the classification algorithms that are implemented includes Decision tree, Random Forest , Support Vector Machines, Logistic Regression , Lazy K Star, Naive Bayes and J48 etc.


Sign in / Sign up

Export Citation Format

Share Document