Detection of Phishing Websites using machine Learning Algorithm

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 07 | July 2022

p-ISSN: 2395-0072

www.irjet.net

Detection of Phishing Websites using machine Learning Algorithm Sneha Shirsath MTECH-IT (Cyber Security), MIT Art, Design and Technology University, Pune MIT School of Engineering ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Phishing is the dishonest attempt to obtain

In this instance, the attacker tries to get the victims to reveal sensitive information. Attackers use the data to commit financial crimes or carry out other types of offences.

private information from people or organisations, such as login information or account information, by posing as a reliable entity in an electronic communication. Attackers frequently use phishing techniques because it is simpler to fool a victim into clicking a malicious link that looks authentic than to try to get past a computer's security measures. Phishing attacks can put users' security and privacy at risk. This study's goal is to provide a general overview of different phishing assaults and strategies for information protection utilising machine learning-based categorization algorithms.

Instead of focusing on a large demographic, spear phishing targets particular individuals. Attackers frequently conduct online and offline research on their targets. They can then personalise their communications and sound more genuine. •

Key Words: Phishing Websites, Machine Learning

Phishing is a tactic used frequently to trick unwitting victims into divulging their personal information by using phoney websites. Phishing website URLs are designed to steal personal data, including user names, passwords, and online financial activities. Phishers employ websites that resemble legitimate websites both aesthetically and linguistically. Utilizing anti-phishing methods to identify phishing is necessary to stop the rapid advancement of phishing techniques as a result of advancing technology. The characteristics and machine learning-based detection methods are surveyed in this work. Attackers frequently use phishing because it is simpler to deceive someone into clicking a malicious link that appears authentic than it is to actually try to trick them.

2. Related Work This section's goal is to draw attention to other people's work that utilises various techniques to get the best results and enhance the system as a whole. [1] Amani, Bashayr, Norah & Aram Developed a system in which they have studied 36 features out of them 3 are the new features and they have categorized them into three main categories such as Features can be extracted from URL, Features can be extracted from page content, Features can be extracted from page rank. During the study they have noticed large number of phishing website doesn’t use the submit button instead they use a regular button, so we consider it as feature for phishing website and website’s page that have logical structure of documents and provide accessing and manipulation for programmer to the DOM file. Afterwards, the extracted features will be sent to the classifier to produce the target label that indicates the state of the website then executes the suitable action on that.

Phishing is a type of fraud that involves presuming to be a reputable person or company in electronic correspondence while actually using a combination of social engineering to get access to sensitive and personal data, such as passwords and open-end credit information. In order to trick people into visiting fake websites using links provided on phishing websites, fake messages are produced to appear legitimate and instructed to originate from real sources such as financial institutions, online business goals, etc.

[2] Mehmet, Our & Bane have developed the system. The proposed systems are tested with some recent datasets iand reached results are compared with the newest works in the literature. The comparison results show that the proposed systems enhance the efficiency of phishing detection and reach very good accuracy rates.

Types of Phishing Assaults: There are currently numerous distinct types of phishing attacks. These are a few of the more typical. Deceptive phishing

[3] Malaika, Anmol, Divyanshukumar, Gokul Developed System where they have used various algorithms Decision Tree, Random Forest classifier, K-Nearest Neihbor. Proposed

The most typical kind of phishing is deceptive phishing.

© 2022, IRJET

|

Impact Factor value: 7.529

Whaling

Whaling is the term for when attackers target a "big fish" like the CEO. These attackers frequently invest a lot of effort in profiling their victims to determine the best time and method to steal from them.

1. INTRODUCTION

Spear phishing

|

ISO 9001:2008 Certified Journal

|

Page 1823


Turn static files into dynamic content formats.

Create a flipbook