Detection and classification of phishing websites
<p>'Phishing sites' are some type of the internet security issues that mainly targets the human vulnerabilities compared to software vulnerabilities. Phishing sites are malicious websites that imitate as legitimate websites or web pages and aim to steal user's personal credentia...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | Libro |
Publicado: |
Trends in Computer Science and Information Technology - Peertechz Publications,
2021-08-11.
|
Materias: | |
Acceso en línea: | Connect to this object online. |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | peertech__10_17352_tcsit_000040 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Manoj P |e author |
700 | 1 | 0 | |a Bhuvan Kumar Y |e author |
700 | 1 | 0 | |a Rakshitha D |e author |
700 | 1 | 0 | |a Megha G |e author |
245 | 0 | 0 | |a Detection and classification of phishing websites |
260 | |b Trends in Computer Science and Information Technology - Peertechz Publications, |c 2021-08-11. | ||
520 | |a <p>'Phishing sites' are some type of the internet security issues that mainly targets the human vulnerabilities compared to software vulnerabilities. Phishing sites are malicious websites that imitate as legitimate websites or web pages and aim to steal user's personal credentials like user id, password, and financial information. Spotting these phishing websites is typically a challenging task because phishing is mainly a semantics-based attack, that mainly focus on human vulnerabilities, not the network or software vulnerabilities. Phishing can be elaborated as the process of charming users in order to gain their personal credentials like user-id's and passwords. In this paper, we come up with an intelligent system that can spot the phishing sites. This intelligent system is based on a machine learning model. Our aim through this paper is to stalk a better performance classifier by examining the features of the phishing site and choose appropriate combination of systems for the training of the classifier. </p> | ||
540 | |a Copyright © Manoj P et al. | ||
546 | |a en | ||
655 | 7 | |a Research Article |2 local | |
856 | 4 | 1 | |u https://doi.org/10.17352/tcsit.000040 |z Connect to this object online. |