Review Process on URL Phishing
DOI:
https://doi.org/10.32628/IJSRST218344Keywords:
Extreme Learning Machine, Features Classification, Reporting PhishingAbstract
Phishing is that the most typical and most dangerous attack among cybercrimes. The aim of these attacks is to steal the data that’s utilized by people and organizations to perform transactions or any vital info. The goal of this is often to perform an Extreme Learning Machine (ELM) primarily based upon the classification of options together with Phishing Websites information among the UC Irvine Machine Learning Repository information. For results assessment, ELM was compared with different machine learning (SVM), Naive Thomas Bayes (NB) strategies and detected to possess the best possible accuracy.
References
- L. McCluskey, F. Thabtah, and R. M. Mohammad, "Intelligent rule-based phishing websites classification," IET Inf. Secure., vol. 8, no. 3, pp. 153–160, 2014.
- R. M. Mohammad, F. Thabtah, and L. McCluskey, "Predicting phishing websites based on self-structuring neural network," Neural Compute. Appl., vol. 25, no. 2, pp. 443–458, 2014.
- W. Hadi, F. Aburub, and S. Alhawari, "A new fast associative classification algorithm for detecting phishing websites," Appl. Soft Compute. J., vol. 48, pp. 729–734, 2016.
- N. Abdelhamid, "Multi-label rules for phishing classification," Appl. Compute. Informatics, vol. 11, no. 1, pp. 29–46, 2015.
- Internal Revenue Service, IRS E-mail Schemes. Available at https://www.irs.gov/uac/newsroom/consumers-warnedof-new-surge-in-irs-email-schemes-during-2016-tax-season-tax-industry-also-targeted
- Federal Trade Commission-Consumer Information- Retrieved from: https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-s
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.