Intelligent phishing url detection using association rule mining
نویسندگان
چکیده
منابع مشابه
A Review on Phishing URL Detection using Machine Learning Systems
Seeking sensitive user data in the form of online banking user-id and passwords or credit card information, which may then be used by ‘phishers’ for their own personal gain is the primary objective of the phishing e-mails. With the increase in the online trading activities, there has been a phenomenal increase in the phishing scams which have now started achieving monstrous proportions. This pa...
متن کاملIntelligent computation for association rule mining
Although there have been several encouraging attempts at developing SQL-based methods for data mining, simplicity and efficiency still remain significant impediments for further development. In this paper, we develop a fixpoint operator for computing frequent itemsets and demonstrate three query paradigm solutions for association rule mining that use the idea of least fixpoint computation. We c...
متن کاملIntelligent rule-based phishing websites classification
Phishing is described as the art of emulating a website of a creditable firm intending to grab user’s private information such as usernames, passwords and social security number. Phishing websites comprise a variety of cues within its content-parts as well as browser-based security indicators. Several solutions have been proposed to tackle phishing. Nevertheless, there is no single magic bullet...
متن کاملRule-Based Phishing Attack Detection
The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...
متن کاملMining Anomaly using Association Rule
9 ABSTRACT In a world where critical equipments are connected to internet, hence protection against professional cyber criminals is important. Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Human-centric Computing and Information Sciences
سال: 2016
ISSN: 2192-1962
DOI: 10.1186/s13673-016-0064-3