Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/14923
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ajaykumar K. B | |
dc.contributor.author | Rudra B. | |
dc.date.accessioned | 2021-05-05T10:16:00Z | - |
dc.date.available | 2021-05-05T10:16:00Z | - |
dc.date.issued | 2021 | |
dc.identifier.citation | Advances in Intelligent Systems and Computing , Vol. 1176 , , p. 55 - 64 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-981-15-5788-0_6 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/14923 | - |
dc.description.abstract | Phishing is ordinarily acquainted with increase a position in an organization or administrative systems as a zone of a greater assault, similar to an advanced tireless risk (APT) occasion. An association surrendering to such a partner degree assault generally continues serious money related misfortunes furthermore to declining piece of the pie, notoriety, and customer trust. Depending on scope, a phishing attempt may step up into a security episode from that a business can have an inconvenient time recuperating. So as to locate this kind of assault, we endeavored to make a machine learning model that advises the client that it is suspicious or genuine. Phishing sites contain various indications among their substance also, web program-based information. The motivation behind this investigation is to perform different AI-based order for 30 features incorporating Phishing Websites Data in the UC Irvine AI Repository database. For results appraisal, random forest (RF) was contrasted and elective machine learning ways like linear regression (LR), support vector machine (SVM), Naive Bayes (NB), gradient boosting classifier (GBM), artificial neural network (ANN) and recognized to have the most noteworthy exactness of 97.39. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. | en_US |
dc.title | Machine Learning Techniques for the Investigation of Phishing Websites | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.