scispace - formally typeset
Open AccessBook ChapterDOI

Detection of Phishing Attacks: A Machine Learning Approach

TLDR
Though there are several anti-phishing software and techniques for detecting potential phishing attempts in emails and detecting phishing contents on websites, phishers come up with new and hybrid techniques to circumvent the availableSoftware and techniques.
Abstract
Phishing is a form of identity theft that occurs when a malicious Web site impersonates a legitimate one in order to acquire sensitive information such as passwords, account details, or credit card numbers.Though there are several anti-phishing software and techniques for detecting potential phishing attempts in emails and detecting phishing contents on websites, phishers come up with new and hybrid techniques to circumvent the available software and techniques.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

The Case for Learned Index Structures

TL;DR: In this paper, the authors propose to replace traditional index structures with learned models, which can have significant advantages over traditional indexes, and theoretically analyze under which conditions learned indexes outperform traditional index structure and describe the main challenges in designing learned index structures.
Journal ArticleDOI

A Survey of Phishing Email Filtering Techniques

TL;DR: This is the first comprehensive survey to discuss methods of protection against phishing email attacks in detail, and presents an overview of the various techniques presently used to detect phishing emails, at the different stages of attack, mostly focusing on machine-learning techniques.
Journal ArticleDOI

Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach

TL;DR: A novel framework using a Bayesian approach for content-based phishing web page detection is presented, which takes into account textual and visual contents to measure the similarity between the protected web page and suspicious web pages.
Journal ArticleDOI

A survey of the applications of text mining in financial domain

TL;DR: A state-of-the-art survey of various applications of Text mining to finance, categorized broadly into FOREX rate prediction, stock market prediction, customer relationship management (CRM) and cyber security.
Journal ArticleDOI

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

TL;DR: A taxonomy of semantic attacks, as well as a survey of applicable defences, is presented, contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix to identify the areas where further research can be particularly beneficial.
References
More filters
Journal ArticleDOI

LIBSVM: A library for support vector machines

TL;DR: Issues such as solving SVM optimization problems theoretical convergence multiclass classification probability estimates and parameter selection are discussed in detail.
Book

Data Mining: Practical Machine Learning Tools and Techniques

TL;DR: This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining.
Book

Data Mining

Ian Witten
TL;DR: In this paper, generalized estimating equations (GEE) with computing using PROC GENMOD in SAS and multilevel analysis of clustered binary data using generalized linear mixed-effects models with PROC LOGISTIC are discussed.
Journal ArticleDOI

Original Contribution: A scaled conjugate gradient algorithm for fast supervised learning

TL;DR: Experiments show that SCG is considerably faster than BP, CGL, and BFGS, and avoids a time consuming line search.
Related Papers (5)