Phishing Detection Using Machine Learning Techniques
As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open t...
Saved in:
Published in: | 2023 3rd Asian Conference on Innovation in Technology (ASIANCON) pp. 1 - 6 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
25-08-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open the malicious link in this way hacker gets the important information about the target victim like passwords and login details. So, the user needs to be conscious about which is a malicious link, and which is a legitimate link. Machine learning can be one of the ways to classify the malicious links and the legitimate links by which we can stop the 95% of phishing attacks. This paper is about training machine learning models using phishing datasets to classify the URLs whether they are legitimate URLs or phishing URLs. Machine learning models used to train are KNN, Decision tree, Random Forest, Logistic Regression, CNN, RNN, and all the model's accuracy and all other evaluation metrics are compared and Logistic regression and CNN gave the highest accuracy of 95% and 96% respectively. |
---|---|
AbstractList | As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open the malicious link in this way hacker gets the important information about the target victim like passwords and login details. So, the user needs to be conscious about which is a malicious link, and which is a legitimate link. Machine learning can be one of the ways to classify the malicious links and the legitimate links by which we can stop the 95% of phishing attacks. This paper is about training machine learning models using phishing datasets to classify the URLs whether they are legitimate URLs or phishing URLs. Machine learning models used to train are KNN, Decision tree, Random Forest, Logistic Regression, CNN, RNN, and all the model's accuracy and all other evaluation metrics are compared and Logistic regression and CNN gave the highest accuracy of 95% and 96% respectively. |
Author | Nishitha, U Kumaran, U Kandimalla, Revanth Mourya Vardhan, Reddy M |
Author_xml | – sequence: 1 givenname: U surname: Nishitha fullname: Nishitha, U email: unishitha9@gmail.com organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India – sequence: 2 givenname: Revanth surname: Kandimalla fullname: Kandimalla, Revanth email: revu5974@gmail.com organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India – sequence: 3 givenname: Reddy M surname: Mourya Vardhan fullname: Mourya Vardhan, Reddy M email: mourya0410@gmail.com organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India – sequence: 4 givenname: U surname: Kumaran fullname: Kumaran, U email: u_kumaran@blr.amrita.edu organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India |
BookMark | eNo1j01PwzAQRI0EByj9BxwicU5Y23W8Pkbhq1JoK7U9V_ZmSyyBC0k48O9pBZxG8w5PM1fiPB0SC3EroZAS3F21nleLerkwaJ0uFChdSFAWjIEzMXXWoTagQSnESzFbdXHoYnrN7nlkGuMhZdvh1F88HTlnDfs-ncCGqUvx84uHa3Gx928DT_9yIraPD5v6OW-WT_O6avIopRvzgJJapuMOS7AvfamDBW3ZG9-yamUg8mQUBTTBBW4lIgIrnDnQZSlbPRE3v97IzLuPPr77_nv3f0b_AMrZRUY |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ASIANCON58793.2023.10270550 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350302288 9798350302257 |
EndPage | 6 |
ExternalDocumentID | 10270550 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-b81cdec5877c0f6a63b7037ea5ade2d1bccac52cb85b9bed18880e284903661d3 |
IEDL.DBID | RIE |
IngestDate | Wed Oct 18 05:40:17 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-b81cdec5877c0f6a63b7037ea5ade2d1bccac52cb85b9bed18880e284903661d3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_10270550 |
PublicationCentury | 2000 |
PublicationDate | 2023-Aug.-25 |
PublicationDateYYYYMMDD | 2023-08-25 |
PublicationDate_xml | – month: 08 year: 2023 text: 2023-Aug.-25 day: 25 |
PublicationDecade | 2020 |
PublicationTitle | 2023 3rd Asian Conference on Innovation in Technology (ASIANCON) |
PublicationTitleAbbrev | ASIANCON |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8941582 |
Snippet | As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Computational modeling Deep learning Logistic regression machine learning Machine learning algorithms malware Phishing phishing attack phishing detection Training Uniform resource locators |
Title | Phishing Detection Using Machine Learning Techniques |
URI | https://ieeexplore.ieee.org/document/10270550 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RDogJEEG8ZQlWh9p5OWNFW8FAValFYqti-wIsKaLJ_-fsJEUMDGyWLcu6s0_ne30HcKdEQQvacBcC4nFRkswpq1zpUyllacmo8K6LZTZ_VZOpg8nhu1oYRPTJZxi6oY_l241pnKuMJFw68Bey0AdZrtpirX247XAz78fLpzFZwvNE0aMLXV_wsN_xq3eKVx2zw38eegTBTxEeW-zUyzHsYXUC8eK9dRqxCdY-i6piPurPnn1WJLIOMPWNrXp01m0AL7Pp6uGRd40P-IcQec21EsaiIToyMyrTIo00CWaGRVJYlFZoYrtJpNEq0blGYihJIZKiyUkfpcJGpzCsNhWeActkpFGMTGwjjPNM6zh3eRGxTYUq6TN0DoEjef3ZYluse2ov_pi_hAPHWOdVlckVDOuvBq9hsLXNjb-ObwSvi7M |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60gnpSseLbgF63NtnsJnsstqXFthRawVvZJLPqZSu2-_-dpA_x4MFbSAhhJhkm8_oG4EHznBaMjXwIKJJ5QTKnnfalT4UQhSOjIrguJmr0qtsdD5MTbWthEDEkn2HDD0Ms381t5V1lJOHCg7-Qhb6XSJWqVbnWPtyvkTMfW5N-i2zhUaLp2TV8Z_DGZs-v7ilBeXSP_nnsMdR_yvDYeKtgTmAHy1OQ4_eV24i1cRnyqEoW4v5sGPIika0hU9_YdIPPuqjDS7czfepF69YH0Qfn2TIymluHluhQtlmkeRobEk2FeZI7FI4bYrxNhDU6MZlBYinJIZKqyUgjpdzFZ1Ar5yWeA1MiNsibVroYZaaMkZnPjJAu5bqg79AF1D3Js88VusVsQ-3lH_N3cNCbDgezQX_0fAWHnsnexyqSa6gtvyq8gd2Fq27D1XwDk7uPBA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+3rd+Asian+Conference+on+Innovation+in+Technology+%28ASIANCON%29&rft.atitle=Phishing+Detection+Using+Machine+Learning+Techniques&rft.au=Nishitha%2C+U&rft.au=Kandimalla%2C+Revanth&rft.au=Mourya+Vardhan%2C+Reddy+M&rft.au=Kumaran%2C+U&rft.date=2023-08-25&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FASIANCON58793.2023.10270550&rft.externalDocID=10270550 |