Phishing Detection Using Machine Learning Techniques

As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open t...

Full description

Saved in:
Bibliographic Details
Published in:2023 3rd Asian Conference on Innovation in Technology (ASIANCON) pp. 1 - 6
Main Authors: Nishitha, U, Kandimalla, Revanth, Mourya Vardhan, Reddy M, Kumaran, U
Format: Conference Proceeding
Language:English
Published: IEEE 25-08-2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open the malicious link in this way hacker gets the important information about the target victim like passwords and login details. So, the user needs to be conscious about which is a malicious link, and which is a legitimate link. Machine learning can be one of the ways to classify the malicious links and the legitimate links by which we can stop the 95% of phishing attacks. This paper is about training machine learning models using phishing datasets to classify the URLs whether they are legitimate URLs or phishing URLs. Machine learning models used to train are KNN, Decision tree, Random Forest, Logistic Regression, CNN, RNN, and all the model's accuracy and all other evaluation metrics are compared and Logistic regression and CNN gave the highest accuracy of 95% and 96% respectively.
AbstractList As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages which contain dangerous links or URLs that can be sent through emails and chat applications that messages target the victim and make him open the malicious link in this way hacker gets the important information about the target victim like passwords and login details. So, the user needs to be conscious about which is a malicious link, and which is a legitimate link. Machine learning can be one of the ways to classify the malicious links and the legitimate links by which we can stop the 95% of phishing attacks. This paper is about training machine learning models using phishing datasets to classify the URLs whether they are legitimate URLs or phishing URLs. Machine learning models used to train are KNN, Decision tree, Random Forest, Logistic Regression, CNN, RNN, and all the model's accuracy and all other evaluation metrics are compared and Logistic regression and CNN gave the highest accuracy of 95% and 96% respectively.
Author Nishitha, U
Kumaran, U
Kandimalla, Revanth
Mourya Vardhan, Reddy M
Author_xml – sequence: 1
  givenname: U
  surname: Nishitha
  fullname: Nishitha, U
  email: unishitha9@gmail.com
  organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India
– sequence: 2
  givenname: Revanth
  surname: Kandimalla
  fullname: Kandimalla, Revanth
  email: revu5974@gmail.com
  organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India
– sequence: 3
  givenname: Reddy M
  surname: Mourya Vardhan
  fullname: Mourya Vardhan, Reddy M
  email: mourya0410@gmail.com
  organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India
– sequence: 4
  givenname: U
  surname: Kumaran
  fullname: Kumaran, U
  email: u_kumaran@blr.amrita.edu
  organization: Amrita School of Computing,Dept. of Computer Science & Engineering,Bengaluru,India
BookMark eNo1j01PwzAQRI0EByj9BxwicU5Y23W8Pkbhq1JoK7U9V_ZmSyyBC0k48O9pBZxG8w5PM1fiPB0SC3EroZAS3F21nleLerkwaJ0uFChdSFAWjIEzMXXWoTagQSnESzFbdXHoYnrN7nlkGuMhZdvh1F88HTlnDfs-ncCGqUvx84uHa3Gx928DT_9yIraPD5v6OW-WT_O6avIopRvzgJJapuMOS7AvfamDBW3ZG9-yamUg8mQUBTTBBW4lIgIrnDnQZSlbPRE3v97IzLuPPr77_nv3f0b_AMrZRUY
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ASIANCON58793.2023.10270550
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350302288
9798350302257
EndPage 6
ExternalDocumentID 10270550
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-b81cdec5877c0f6a63b7037ea5ade2d1bccac52cb85b9bed18880e284903661d3
IEDL.DBID RIE
IngestDate Wed Oct 18 05:40:17 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-b81cdec5877c0f6a63b7037ea5ade2d1bccac52cb85b9bed18880e284903661d3
PageCount 6
ParticipantIDs ieee_primary_10270550
PublicationCentury 2000
PublicationDate 2023-Aug.-25
PublicationDateYYYYMMDD 2023-08-25
PublicationDate_xml – month: 08
  year: 2023
  text: 2023-Aug.-25
  day: 25
PublicationDecade 2020
PublicationTitle 2023 3rd Asian Conference on Innovation in Technology (ASIANCON)
PublicationTitleAbbrev ASIANCON
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8941582
Snippet As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Computational modeling
Deep learning
Logistic regression
machine learning
Machine learning algorithms
malware
Phishing
phishing attack
phishing detection
Training
Uniform resource locators
Title Phishing Detection Using Machine Learning Techniques
URI https://ieeexplore.ieee.org/document/10270550
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RDogJEEG8ZQlWh9p5OWNFW8FAValFYqti-wIsKaLJ_-fsJEUMDGyWLcu6s0_ne30HcKdEQQvacBcC4nFRkswpq1zpUyllacmo8K6LZTZ_VZOpg8nhu1oYRPTJZxi6oY_l241pnKuMJFw68Bey0AdZrtpirX247XAz78fLpzFZwvNE0aMLXV_wsN_xq3eKVx2zw38eegTBTxEeW-zUyzHsYXUC8eK9dRqxCdY-i6piPurPnn1WJLIOMPWNrXp01m0AL7Pp6uGRd40P-IcQec21EsaiIToyMyrTIo00CWaGRVJYlFZoYrtJpNEq0blGYihJIZKiyUkfpcJGpzCsNhWeActkpFGMTGwjjPNM6zh3eRGxTYUq6TN0DoEjef3ZYluse2ov_pi_hAPHWOdVlckVDOuvBq9hsLXNjb-ObwSvi7M
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60gnpSseLbgF63NtnsJnsstqXFthRawVvZJLPqZSu2-_-dpA_x4MFbSAhhJhkm8_oG4EHznBaMjXwIKJJ5QTKnnfalT4UQhSOjIrguJmr0qtsdD5MTbWthEDEkn2HDD0Ms381t5V1lJOHCg7-Qhb6XSJWqVbnWPtyvkTMfW5N-i2zhUaLp2TV8Z_DGZs-v7ilBeXSP_nnsMdR_yvDYeKtgTmAHy1OQ4_eV24i1cRnyqEoW4v5sGPIika0hU9_YdIPPuqjDS7czfepF69YH0Qfn2TIymluHluhQtlmkeRobEk2FeZI7FI4bYrxNhDU6MZlBYinJIZKqyUgjpdzFZ1Ar5yWeA1MiNsibVroYZaaMkZnPjJAu5bqg79AF1D3Js88VusVsQ-3lH_N3cNCbDgezQX_0fAWHnsnexyqSa6gtvyq8gd2Fq27D1XwDk7uPBA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+3rd+Asian+Conference+on+Innovation+in+Technology+%28ASIANCON%29&rft.atitle=Phishing+Detection+Using+Machine+Learning+Techniques&rft.au=Nishitha%2C+U&rft.au=Kandimalla%2C+Revanth&rft.au=Mourya+Vardhan%2C+Reddy+M&rft.au=Kumaran%2C+U&rft.date=2023-08-25&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FASIANCON58793.2023.10270550&rft.externalDocID=10270550