By I. S. Amiri, O. A. Akanbi, E. Fazeldehkordi
Phishing is without doubt one of the so much widely-perpetrated types of cyber assault, used to collect delicate info similar to bank card numbers, checking account numbers, and person logins and passwords, in addition to different info entered through an internet site. The authors of A Machine-Learning method of Phishing Detetion and security have carried out study to illustrate how a desktop studying set of rules can be utilized as a good and effective device in detecting phishing web content and designating them as info protection threats. this system can turn out important to a large choice of companies and enterprises who're looking strategies to this long-standing risk. A Machine-Learning method of Phishing Detetion and protection additionally offers details protection researchers with a place to begin for leveraging the computing device set of rules technique as an answer to different info protection threats.
Discover novel learn into the makes use of of machine-learning ideas and algorithms to discover and stop phishing attacks
Help what you are promoting or association keep away from expensive harm from phishing sources
Gain perception into machine-learning recommendations for dealing with numerous info safeguard threats
About the Author
O.A. Akanbi got his B. Sc. (Hons, details know-how - software program Engineering) from Kuala Lumpur Metropolitan college, Malaysia, M. Sc. in info safeguard from collage Teknologi Malaysia (UTM), and he's almost immediately a graduate pupil in machine technology at Texas Tech collage His region of analysis is in CyberSecurity.
E. Fazeldehkordi obtained her Associate’s measure in desktop from the college of technology and expertise, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad collage of Tafresh, Iran, and M. Sc. in info protection from Universiti Teknologi Malaysia (UTM). She presently conducts study in details defense and has lately released her learn on cellular advert Hoc community defense utilizing CreateSpace.
Read or Download A Machine-Learning Approach to Phishing Detection and Defense PDF
Similar network security books
Many books concentrate on one working procedure whilst contemplating community safety. John E. Canavan's reference paintings covers ideas and sensible purposes that may be used with all working platforms.
Up-to-date each year, the knowledge safety administration instruction manual, 6th version, quantity 6 is the main entire and updated reference to be had on details safeguard and insurance. Bringing jointly the data, abilities, thoughts, and instruments required of IT safety pros, it enables the up to date figuring out required to stick one step prior to evolving threats, criteria, and rules.
Even if using cloud computing systems and functions has increased speedily, such a lot books at the topic specialise in high-level suggestions. There has lengthy been a necessity for a publication that offers targeted advice on the best way to strengthen safe clouds. Filling this void, constructing and Securing the Cloud offers a entire evaluate of cloud computing know-how.
Securing privateness within the present atmosphere is without doubt one of the nice demanding situations of today’s democracies. privateness vs. safeguard explores the problems of privateness and protection and their complex interaction, from a criminal and a technical standpoint. Sophie Stalla-Bourdillon presents a radical account of the felony underpinnings of the ecu method of privateness and examines their implementation via privateness, info safeguard and knowledge retention legislation.
- Security Warrior
- Penetration Testing: Protecting Networks and Systems
- Security Strategy: From Requirements to Reality
- Cybersecurity Lexicon
- Topics in Cryptology – CT-RSA 2014: The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings
Additional resources for A Machine-Learning Approach to Phishing Detection and Defense
Overview of Research Framework The study is divided into three phases and each phase’s output is an input to the next phase. Phase-1 is based on dataset processing and feature extraction. Phase-2 is based on evaluating individual reference classifiers that involve training and testing using precision, recall, accuracy, and F1-score. Phase-3a is aimed to evaluate the ensemble of all the classifiers using precision, recall, accuracy, and F1-score. Phase-3b compares the result from the two techniques (individual and ensemble) in highlighting the better technique for phishing website detection based on the output of precision, recall, accuracy, and F1-score.
1. 36 A Machine Learning Approach to Phishing Detection and Defense Fig. 1. Research framework. 3 RESEARCH DESIGN The research will be conducted through three main phases. The following subsections will describe each phase briefly. 1 Phase 1: Dataset Processing and Feature Extraction The processing of dataset was carried out on the collected datasets to better refine them to the requirement of the study. Many stages are involved in processing, some of this are: feature extraction, normalization, dataset division, and attribute weighting.
In general, anti-phishing techniques can be grouped into subsequent four categories (Chen and Guo, 2006). Content Filtering In this methodology, content/email is filtered as it enters in the victim’s mail box by means of machine learning methods, such as Support Vector Machines (SVM) or Bayesian Additive Regression Trees (BART) (Tout and Hafner, 2009). Blacklisting Blacklist is collection of recognized phishing Websites/addresses published by dependable entities like Google’s and Microsoft’s blacklist.
A Machine-Learning Approach to Phishing Detection and Defense by I. S. Amiri, O. A. Akanbi, E. Fazeldehkordi