By I. S. Amiri, O. A. Akanbi, E. Fazeldehkordi

Phishing is without doubt one of the so much widely-perpetrated varieties of cyber assault, used to assemble delicate info comparable to bank card numbers, checking account numbers, and consumer logins and passwords, in addition to different info entered through a website. The authors of A Machine-Learning method of Phishing Detetion and protection have performed study to illustrate how a desktop studying set of rules can be utilized as an efficient and effective software in detecting phishing web content and designating them as info safety threats. this technique can turn out precious to a wide selection of companies and organisations who're looking options to this long-standing risk. A Machine-Learning method of Phishing Detetion and safeguard additionally presents details defense researchers with a place to begin for leveraging the desktop set of rules strategy as an answer to different details protection threats.

Discover novel learn into the makes use of of machine-learning ideas and algorithms to observe and stop phishing attacks
Help your small business or association keep away from high priced harm from phishing sources
Gain perception into machine-learning options for dealing with a number of info defense threats
About the Author

O.A. Akanbi bought his B. Sc. (Hons, details expertise - software program Engineering) from Kuala Lumpur Metropolitan college, Malaysia, M. Sc. in details safeguard from collage Teknologi Malaysia (UTM), and he's shortly a graduate pupil in computing device technology at Texas Tech college His quarter of analysis is in CyberSecurity.

E. Fazeldehkordi obtained her Associate’s measure in computing device from the college of technological know-how and expertise, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad collage of Tafresh, Iran, and M. Sc. in info safety from Universiti Teknologi Malaysia (UTM). She at present conducts learn in info protection and has lately released her learn on cellular advert Hoc community safety utilizing CreateSpace.

Show description

Read or Download A Machine-Learning Approach to Phishing Detection and Defense PDF

Similar network security books

IPSec (2nd Edition)

IPSec, moment version is the main authoritative, accomplished, available, and up to date advisor to IPSec expertise. major experts hide all features of IPSec structure, implementation, and deployment; evaluate very important technical advances considering that IPSec used to be first standardized; and current new case reviews demonstrating end-to-end IPSec protection.

A Survey of Data Leakage Detection and Prevention Solutions

SpringerBriefs current concise summaries of state-of-the-art examine and sensible purposes throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers a number content material from expert to educational. Briefs let authors to provide their rules and readers to soak up them with minimum time funding.

Unified Communications Forensics. Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of universal UC assaults is the 1st booklet to give an explanation for the problems and vulnerabilities and display the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) setting. This e-book is written by means of major UC specialists Nicholas provide and Joseph W.

CCSP Self-Study CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide

Community safeguard is a truly complicated enterprise. The Cisco photos Firewall plays a few very particular services as a part of the safety technique. you will need to to be acquainted with many networking and community safeguard ideas sooner than you adopt the CSPFA certification. This ebook is designed for safeguard pros or networking execs who're attracted to starting the safety certification technique.

Extra info for A Machine-Learning Approach to Phishing Detection and Defense

Example text

6 NORMALIZATION As proposed by Al Shalabi and Shaaban (2006), data usually collected from multiple resources and stored in data warehouse may include multiple databases, data cubes, or flat files and as such could result to different issues arising during integration of data needed for mining and discovery. Such issues include scheme integration and redundancy. Therefore, data integration must be done carefully to avoid redundancy and inconsistency that in turn improves the accuracy and speed up the mining process (Jiawei and Kamber, 2001).

An anti-Phishing ppproach that uses training intervention for flushing websites detection is likely to indicate phishing. (Ainajim and Munro, 2009) This paper proposes and evaluates a novel anti-phishing approach that uses training intervention for Phishing websites detection (APTIPWD) in comparison to an existing approach (sending anti-phishing tips by emails) and control group. There is a significant positive effect of using the APTIFWD in comparison on with the existing approach and control group in helping users properly judging legitimate and phishing websites.

3 Visual Similarity-Based Approach Chen et al. (2009) used screenshot of web pages to identify phishing sites. They used Contrast Context Histogram (CCH) to describe the images of web pages and k-mean algorithm to cluster nearest key points. Lastly, euclidean distance between two descriptors is used to obtain similarity between two sites. 1% false positive. Chen et al. (2009) claimed that screenshot analysis lack efficiency in proper detection of online phishing. Fu et al. (2006) utilized Earth Mover’s Distance (EMD) to associate low-resolution screen capture of a web page.

Download PDF sample

Rated 4.70 of 5 – based on 12 votes