DETECTION OF PHISHING ATTACKS IN ONLINE TRANSACTION WEBSITE USING PLUGINS WITH DATA MINING FEATURES

By: LAWAL DANIEL TOLUWALOPEMaterial type: TextTextPublisher: Mountain Top University Computer Science and Mathematics September, 2023Edition: Dr. D.D. AleburuDescription: 62pSubject(s): Computer ScienceSummary: Phishing is a fraud technique used for fraud wherever users receive pretend e-mails from deceiving addresses that appear as happiness to legitimate and real businesses in a trial to steal the receiver’s details. This act endangers the privacy of the many users and thus, researchers work unendingly on finding detection tools and developing existing ones. Classification is one among the machine learning techniques which will be effectively accustomed discover received phishing emails.Through this analysis, varied classification algorithms ar mentioned and compared, such as; Naïvebayes, call Tree (DT), logistical Regression, Classification, and Regression Trees and consecutive bottom optimisation (SMO). a brand new system was designed to discover phishing emails in integration between the supervised and unattended techniques. additionally, the study compares the manual and automatic feature choice teams for the e-mail. The experiment was dead exploitation rail Tool on a dataset of 4800 Emails, 2400 phishing emails, and 2400 legitimate emails representing the forty seven options of the e-mail structure. Indicated that the most effective manually elite teams achieved Associate in Nursing equal accuracy level achieved by the machinecontrolled options cluster of ninety eight.25 percent(%).Also, the choice Tree, J48, and SMO classifiers screw-topped the previously-mentioned algorithms by providing the best accuracy average in each manual and automatic situations. Moreover, Associate in Nursing integrated system of multiple classifiers was made exploitation the 3 high algorithms of SMO, call Tree, and J48 and therefore the results showed that integration unattended techniques with supervised ones before the testing provides additional correct results of police investigation phishing emails with 98.37 for all the options. In this project, different plugins were used using data mining. This is used to perform a live simulation phishing technique known as spear phishing. In the end, this was used to develop a phishing detecting system in online transactions.Keywords: Phishing Emails, Data mining, Clustering, Classification, spear phish.Tools used: OS: Kali Linux, BackTrack Plugins: social engineering toolkit, Netcraft
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current location Call number Status Date due Barcode Item holds
Main Library
Not for loan 18010301058
Total holds: 0

Phishing is a fraud technique used for fraud wherever users receive pretend e-mails from deceiving addresses that appear as happiness to legitimate and real businesses in a trial to steal the receiver’s details. This act endangers the privacy of the many users and thus, researchers work unendingly on finding detection tools and developing existing ones. Classification is one among the machine learning techniques which will be effectively accustomed discover received phishing emails.Through this analysis, varied classification algorithms ar mentioned and compared, such as; Naïvebayes, call Tree (DT), logistical Regression, Classification, and Regression Trees and consecutive bottom optimisation (SMO). a brand new system was designed to discover phishing emails in integration between the supervised and unattended techniques. additionally, the study compares the manual and automatic feature choice teams for the e-mail. The experiment was dead exploitation rail Tool on a dataset of 4800 Emails, 2400 phishing emails, and 2400 legitimate emails representing the forty seven options of the e-mail structure. Indicated that the most effective manually elite teams achieved Associate in Nursing equal accuracy level achieved by the machinecontrolled options cluster of ninety eight.25 percent(%).Also, the choice Tree, J48, and SMO classifiers screw-topped the previously-mentioned algorithms by providing the best accuracy average in each manual and automatic situations. Moreover, Associate in Nursing integrated system of multiple classifiers was made exploitation the 3 high algorithms of SMO, call Tree, and J48 and therefore the results showed that integration unattended techniques with supervised ones before the testing provides additional correct results of police investigation phishing emails with 98.37 for all the options. In this project, different plugins were used using data mining. This is used to perform a live simulation phishing technique known as spear phishing. In the end, this was used to develop a phishing detecting system in online transactions.Keywords: Phishing Emails, Data mining, Clustering, Classification, spear phish.Tools used: OS: Kali Linux, BackTrack Plugins: social engineering toolkit, Netcraft

There are no comments on this title.

to post a comment.

Powered by Koha