dc.contributor.author | Mohamed, Gori | |
dc.contributor.author | Visumathi, J. | |
dc.contributor.author | Mahdal, Miroslav | |
dc.contributor.author | Anand, Jose | |
dc.contributor.author | Elangovan, Muniyandy | |
dc.date.accessioned | 2022-10-06T12:28:14Z | |
dc.date.available | 2022-10-06T12:28:14Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Processes. 2022, vol. 10, issue 7, art. no. 1356. | cs |
dc.identifier.issn | 2227-9717 | |
dc.identifier.uri | http://hdl.handle.net/10084/148689 | |
dc.description.abstract | Phishing is one of the biggest crimes in the world and involves the theft of the user's sensitive data. Usually, phishing websites target individuals' websites, organizations, sites for cloud storage, and government websites. Most users, while surfing the internet, are unaware of phishing attacks. Many existing phishing approaches have failed in providing a useful way to the issues facing e-mails attacks. Currently, hardware-based phishing approaches are used to face software attacks. Due to the rise in these kinds of problems, the proposed work focused on a three-stage phishing series attack for precisely detecting the problems in a content-based manner as a phishing attack mechanism. There were three input values-uniform resource locators and traffic and web content based on features of a phishing attack and non-attack of phishing website technique features. To implement the proposed phishing attack mechanism, a dataset is collected from recent phishing cases. It was found that real phishing cases give a higher accuracy on both zero-day phishing attacks and in phishing attack detection. Three different classifiers were used to determine classification accuracy in detecting phishing, resulting in a classification accuracy of 95.18%, 85.45%, and 78.89%, for NN, SVM, and RF, respectively. The results suggest that a machine learning approach is best for detecting phishing. | cs |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartofseries | Processes | cs |
dc.relation.uri | https://doi.org/10.3390/pr10071356 | cs |
dc.rights | © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | phishing | cs |
dc.subject | attack detection | cs |
dc.subject | web crawler | cs |
dc.subject | heuristic analysis | cs |
dc.subject | machine learning classification | cs |
dc.title | An effective and secure mechanism for phishing attacks using a machine learning approach | cs |
dc.type | article | cs |
dc.identifier.doi | 10.3390/pr10071356 | |
dc.rights.access | openAccess | cs |
dc.type.version | publishedVersion | cs |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 10 | cs |
dc.description.issue | 7 | cs |
dc.description.firstpage | art. no. 1356 | cs |
dc.identifier.wos | 000833302000001 | |