Phishing websites blacklisting using machine learning algorithms

  • Authors

    • Nivedhitha G
    • Carmel Mary Belinda M.J
    • Rupavathy N
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.10646
  • Feature extraction, Blacklisting, Phishing
  • The development of the phishing sites is by all accounts amazing. Despite the fact that the web clients know about these sorts of phishing assaults, part of clients move toward becoming casualty to these assaults. Quantities of assaults are propelled with the point of making web clients trust that they are speaking with a trusted entity. Phishing is one among them. Phishing is consistently developing since it is anything but difficult to duplicate a whole site utilizing the HTML source code. By rolling out slight improvements in the source code, it is conceivable to guide the victim to the phishing site. Phishers utilize part of strategies to draw the unsuspected web client. Consequently an efficient mechanism is required to recognize the phishing sites from the real sites keeping in mind the end goal to spare credential data. To detect the phishing websites and to identify it as information leaking sites, the system proposes data mining algorithms. In this paper, machine-learning algorithms have been utilized for modeling the prediction task. The process of identity extraction and feature extraction are discussed in this paper and the various experiments carried out to discover the performance of the models are demonstrated.

  • References

    1. [1] Lakshmi, V. Santhana, and M.S. Vijaya. "Efficient prediction of phishing websites using supervisedlearning algorithms", Procedia Engineering, 2012.

      [2] “Payword and micromint: Two simple micropayment schemes,â€,R. L. Rivest, in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.

      [3] S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous electronic currency system,†in Proc. Conf. Center Adv. Stud. Collaborative Res., 2011, pp. 349–350.

      [4] “2014 data breach investigations report,†Verizon, Tech. Rep.,2014,http://www.verizonenterprise.com/DBIR/2014/

      [5] “Point-of-sale system breaches, threats to the retail and hospitality industriesâ€, T. Micro, University of Zurich, Department of Informatics, 2010.

      [6] “Beyond the breach,†Mandiant, 2014, https://dl.mandiant.com/EE/library/WP_MTrends2014_140409.pdf

      [7] “Collective spatial keyword queries: A distance owner-driven approachâ€, C. Long, R. C.-W. Wong, K. Wang, and A. W.-C. Fu, in Proc. ACM SIGMOD Int. Conf. Manage. Data, pp. 689–700,2013.

      [8] “Keyword search in spatial databases: Towards searching by documentâ€, D. Zhang, Y. M. Chee, A. Mondal, A. K. H. Tung, and M. Kitsuregawa, in Proc. IEEE 25th Int. Conf. Data Eng., pp. 688–699,2009.

      “Locality sensitive hashing scheme based on p-stable distributionsâ€, M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, in Proc. 20th Annu. Symp. Comput. Geometry, 2004, pp. 253–262
  • Downloads

  • How to Cite

    G, N., Mary Belinda M.J, C., & N, R. (2018). Phishing websites blacklisting using machine learning algorithms. International Journal of Engineering & Technology, 7(1.7), 179-181. https://doi.org/10.14419/ijet.v7i1.7.10646