ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : Phishing Page And Maliciousurl Detection Via Support Vector Machine Using Page Layout Feature

ISSN : 2394-2231
Year of Publication : 2020

10.29126/23942231/IJCT-V7I2P5
Authors: Mr. S. Jagadeesan, M.E , Mr. M. Prakash

         



MLA Style: Mr. S. Jagadeesan, M.E , Mr. M. Prakash, "Phishing Page And Maliciousurl Detection Via Support Vector Machine Using Page Layout Feature" Volume 7 - Issue 2 March - April,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: Mr. S. Jagadeesan, M.E , Mr. M. Prakash, "Phishing Page And Maliciousurl Detection Via Support Vector Machine Using Page Layout Feature" Volume 7 - Issue 2 March - April,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
The World Wide Web has come to be the most important criterion for statistics verbal exchange and information dissemination. It lets in to transact facts timely, and easily. Identity robbery and identification fraud are referred as factors of cyber crime wherein hackers and malicious individual s advantage the private records of modern valid customers to attempt fraud or deception motivation for financial E-Mails are used as phishing gear wherein legitimate looking emails are dispatched making the genuine clients identification with genuine content fabric with malicious It permits to souse borrow consumers' private in turn inclusive of individual names, account numbers, passwords and other Spam E-Mails emerges or transforms as Phishing mails. Spoofed Mails plays a crucial role in which the hackers pretends to be a valid sender posing to be from a legitimate business agency which divulges the client to offer his private The content cloth fabric fabric material may escape from Content based completely filters or the email can be without any frame of the message except malicious URL This paper identifies malicious URLs in email through reduced characteristic set method. Hackers skip anti-unsolicited mail filtering techniques thru embedding malicious URL inside the content cloth of the messages. Hence the URL analyzer technique with the assist of minimized phishing characteristic set identifies the malicious URL within the emails.

Reference
[1] Colin Whittaker, Brian Ryner and MarriaNazif, “Large-Scale Automatic Classification of Phishing Pages”, In proceedings of NDSS, 2010. [2] Fette, I., Sadeh, N. and Tomasic, A. “Learning to Detect Phishing Emails’ In WWW”, Proceedings of the 16th International conference on World Wide Web, pp. 649-656, 2007. [3] Garera, S., Provos, N., Rubin, A.D. and Chew, M. “A Framework for Detection and Measurement of Phishing Attacks” In Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 1-8, 2007. [4] Justin Ma, Lawrence K. Saul, Stefan Savage and Geoffrey M. Voelker, “Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs”, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining pp.1245-1254, 2009. [5] Justin Ma, Lawrence Saul, K., Stefan Savage and Geoffrey Voelker, M. “Identifying Suspicious URLs: An Application of Large-Scale Online Learning”, In ICML ’09: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 681-688, 2009

Keywords
Anti-phishing, Machine learning, Aggregation analysis.

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)