Smart Phishing Url Detection Using Association Rule Mininga Seminar Report

Smart Phishing Url Detection Using Association Rule Mininga Seminar Report

Length: 1365 words (3.9 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

Intelligent phishing url detection using association rule miningA seminar report submittedtoMANIPAL UNIVERSITYFor Partial Ful llment of the Requirement for theAward of the DegreeofBachelor of TechnologyinInformation TechnologybyHriddhi DeyReg. No. 130911388September 2016
AbstractPhishing is an online criminal act that occurs when a malicious webpage im-personates as legitimate webpage so as to acquire sensitive information from theuser. Phishing attack continues to pose a serious risk for web users and annoyingthreat within the eld of electronic commerce. This paper focuses on discerningthe signi cant features that discriminate between legitimate and phishing URLs.These features are then subjected to associative rule mining apriori and predic-tive apriori. The rules obtained are interpreted to emphasize the features that aremore prevalent in phishing URLs. Analyzing the knowledge accessible on phishingURL and considering con dence as an indicator, the features like transport layersecurity, unavailability of the top level domain in the URL and keyword within thepath portion of the URL were found to be sensible indicators for phishing URL. Inaddition to this number of slashes in the URL, dot in the host portion of the URLand length of the URL are also the key factors for phishing URL.1
1 Introduction1.1 PhishingPhishing is the attempt to obtain sensitive information such as usernames, passwords,and credit card details (and sometimes, indirectly, money), often for malicious reasons,by masquerading as a trustworthy entity in an electronic communication. The word is aneologism created as a homophone of shing due to the similarity of using a bait in anattempt to catch a victim. Communications purporting to be from popular...


... middle of paper ...


...e system prediction is notexclusively based on querying search engine result.Huang et al. [8] proposed SVM based technique to detect phishing URL. The fea-tures used are structural, lexical and brand names that exist in the URL. However, morefeatures related to URL are considered in the proposed work. Neda et al. [23] proposedrule based classi cation algorithm to detect phishing URL. However the rule used in thisis based on human experience rather than intelligent data mining technique. In the ap-proach proposed by Han et al. [24] the system warns the user, when the user submits theusername and password for the rst time, although the current website is a legitimatewebsite. This is because the information about the legitimate website is not maintained.This login problem is eliminated in our system as a repository of white list is e ectivelymaintained.4
23

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Phishing And Phishing Essay

- The presentation is on the topic Phishing. This presentation will give you a better understanding of phishing, phishing techniques, how phishing works?, example of phishing, avoid becoming a victim, and what to do if you have been ‘caught’. Slide 3: Phishing Phishing is a form of fraud in which attacker attempt to trick the user into surrendering private information. It is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise. An attacker’s goal is to compromise systems to get personal information like passwords, credit card numbers, social security numbers, bank account number, financial data or other information....   [tags: Phishing, E-mail, Identity theft, Password, Spam]

Better Essays
1104 words (3.2 pages)

Risk Of A Successful Phishing Attack Essay

- Background It’s no surprise the financial sector is a high priority target for cyberattackers. While much of the world’s infrastructure has gone from cash to digital exchanges, banking institutions are as relevant and important as ever. As infamous bank robber Willie Sutton once answered a when asked why he robbed banks - “because that’s where the money is”. Financial institutions are particularly concerned about cyberattacks, as their value to customers is reliant on trust. A major breach can spell ruin, as reputation and security are critical to their success....   [tags: Security, Computer security, E-mail, Phishing]

Better Essays
1323 words (3.8 pages)

Email E Email : Email Phishing Essay

- Email phishing A spoofed email is one that claims to be originating from one source when it was actually sent from another. Email spoofing is a common phishing techniques in which a phisher sends spoofed emails, with the sender address and other parts of the email header altered, in order to deceive the person who the email was sent to. Mock Messages generally seem, by all accounts, to be from a site or monetary foundation that the beneficiary might have business with, so that a clueless beneficiary would presumable take activities as educated by the email substance for example: - Reply the email with their credit card number - Click on the labelled as view my statement, and enter the pas...   [tags: E-mail, Simple Mail Transfer Protocol, Phishing]

Better Essays
1813 words (5.2 pages)

The Detection of Ammonia Using Gas Sensros Essay

- Detection of ammonia can be done using gas sensors. Examples of different application areas of ammonia gas sensing are; environmental monitoring, medical diagnostics, chemical laboratories and detection of ammonia in portable water and wastewater (Timmer et al., 2005). High concentrations of ammonia are easy to detect while for very low concentrations we require different gas sensors operating at different sensing principles. Ammonia gas sensors operate at different temperatures each having a specific detection limit range and response time to measure the ppm and sub-ppm concentrations rapidly....   [tags: metal oxide, relativism]

Better Essays
747 words (2.1 pages)

Autonomous Detection of Botnets Using Passive DNS Essay

- 1 Background A botnet is a collection of compromised hosts (bots) under control of a com- mon Command & Control (C&C). The C&C is used by a remote controller to issue commands to the different infected hosts. A botnet may have several purposes, the most common include Denial-of-Servoice (DoS) attacks, identity theft, proxy, spreading of malware and spamming. Traditional ways to disrupt such networks, such as Domain Name System Blacklists (DNSBL’s) or firewalls, rely on the knowledge of the Internet address of the C&C....   [tags: control, identity, internet]

Better Essays
729 words (2.1 pages)

The Sport of Spear Phishing: A Popular Sporting Event to Some, A Life Altering Scam to Others

- Introduction Cyber crime is something that has become part of today’s cyberspace culture and it is a steadily growing threat on the rise. Trusteer” a Boston-based computer security company recently published a report titled “Measuring the Effectiveness of In-the-Wild Phishing Attacks”. Based on Trusteer’s calculations they concluded that the loss per every successfully compromised online banking account is approximately $2,000 which is equivalent to $9.4M per year per each one million customers....   [tags: Phishing, cyber, APWG]

Better Essays
1508 words (4.3 pages)

Issues Raised by Use of Turnitin Plagiarism Detection Software Essay

- Issues Raised by Use of Turnitin Plagiarism Detection Software This past week, I worked with a couple of other members of the Writing Department at GVSU to prepare a position statement on plagiarism detection software. GVSU only recently acquired a subscription to Turnitin, and myself and the other teachers were concerned that teachers in other disciplines would be unware of the issues surrounding plagiarism detection services. The following is the full text of the statement which has been distributed on our campus....   [tags: Plagiarism Detection Software]

Free Essays
949 words (2.7 pages)

Automatic Surveillance: Vision Detection Using Gaussian Processes Analysis

- ... Pixels of sharp variations are consequently classified into the foreground. Many techniques have been established to work in the frame of this principle among which we can list: the running average [1] [2] that interest in modelling the background each pixel location by fitting a Gaussian probability density function (Pdf) on the last n pixel’s values. At each frame time, the pixel's value can then be classified as a foreground pixel if the difference between its values and the estimated mean values exceeds a given threshold....   [tags: detecting moving objects, application]

Better Essays
625 words (1.8 pages)

Phishing Essay examples

- Phishing The Oxford pocket dictionary defines phishing as the activity of defrauding an online account holder of financial information by posing as a legitimate company. This is what phishing is known for now in today’s internet driven world but it was not always the case. Phishing actually predates computers. Some people did it over the phone for years and they called it social engineering. So why would someone think of phishing some one. There is a simple reason: to exploit people. These people are commonly known as scam artists....   [tags: Computer Hacking Scams]

Free Essays
1979 words (5.7 pages)

Essay about Have you been a victim of phishing?

- Have you been a victim of phishing. Many words have been added to the English language from the birth of the Internet. Some of these words have been created from the basis of something in existence and others do not seem to be related at all. The resent topic in the Internet world is phishing, a new type of identity theft that is done directly over the Internet without its victims knowing they are being misled. This issue has been a concern of all who are involved. The biggest worry is how can this be prevented....   [tags: Internet Technology Papers]

Better Essays
2126 words (6.1 pages)