CFP last date
20 December 2024
Reseach Article

Clustering and Bayesian Approach-based Model for Detection of Phishing

by Amitkumar Shinde, Angad Pandey, Rahul Pawar, Vinayak Gangule
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 24
Year of Publication: 2015
Authors: Amitkumar Shinde, Angad Pandey, Rahul Pawar, Vinayak Gangule
10.5120/20958-3385

Amitkumar Shinde, Angad Pandey, Rahul Pawar, Vinayak Gangule . Clustering and Bayesian Approach-based Model for Detection of Phishing. International Journal of Computer Applications. 118, 24 ( May 2015), 30-33. DOI=10.5120/20958-3385

@article{ 10.5120/20958-3385,
author = { Amitkumar Shinde, Angad Pandey, Rahul Pawar, Vinayak Gangule },
title = { Clustering and Bayesian Approach-based Model for Detection of Phishing },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 24 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number24/20958-3385/ },
doi = { 10.5120/20958-3385 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:37.106358+05:30
%A Amitkumar Shinde
%A Angad Pandey
%A Rahul Pawar
%A Vinayak Gangule
%T Clustering and Bayesian Approach-based Model for Detection of Phishing
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 24
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Phishing is an internet attack that aims to get users sensitive information by fraud websites. Website phishing is one of the major attacks by which most of internet users are being fooled by the phisher. The best way to protect from phishing is to recognize a phish. Phishing emails usually appear to come from well-known organization and ask your personal information such as credit card number, security number, account number or passwords. What actually attacker does? The attacker creates the no of replicas of authenticate sites, and users are forced to direct to that websites by attracting them with offers. As standard mentioned in W3C (World Wide Web Consortium), I am proposing a system which can easily recognize the difference between authenticate site and phishing site. There are certain standards which are given by W3C (World Wide Web Consortium), based on these standards I am choosing some features which can easily describe the difference between legit site and phish site. To protect you from phishing, I am proposing a model to determine the fraud sites. To determine the phishing attack, URL features and HTML features of web page are considered. Clustering algorithm such as K-Means clustering is applied on the database and prediction techniques such as Naive Bayes Classifier is applied. By applying this, probability of the web site as valid Phish or Invalid Phish. To check the validity of URL,if still we are not able decide the validity of web page then Naïve Bayes Classifier is applied . also training model is applied for the extraction of HTML tag features of site and probability.

References
  1. Rachna Dhamija, J. D. Tygar, and Marti Heast, "Why Phishing Works", CHI-2006, Conference on Human Factor in Computing Systems, April 2006.
  2. RSA Online Fraud Surveyor, "The phishing kit – the same wolf, just different sheep's clothing", RSA Surveys, vol-1, February-2013.
  3. Xiaoqing GU, Hongyuan WANG, and Tongguang NI "An Efficient Approach to Detect Phishing Web" Journal of Computational Information Systems 9:14(2013), 2013, pp. 5553-5560.
  4. Haijun Zhang, Gang Liu, Tommy W. S. Chow, Senior Member, IEEE, and Wenyin Liu, Senior Member, IEEE "Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach", vol-22, IEEE Transactions October- 2011 pp. 1532-1546.
  5. Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi, and Politecnico di Milano "A Layout-Similarity-Based Approach for Detecting Phishing Pages"- unpublished
  6. WIKIPEDIA. ORG- The Online Encyclopedia, http://www. wikipedia. org/
  7. Abraham Sillberschatz, Henry Korth, and S. Sudarshan, "Database System Concepts", 5th Edition, pp. 900-903.
  8. PHISHTANK. COM- The Online Valid Phish Sites Repository, http://data. phishtank. com/data/online-valid. csv
  9. Eric Meisner, Naive Bayes Classifier Example, 22nd November 2003-unpublished
Index Terms

Computer Science
Information Sciences

Keywords

Anti Phishing Technique Bayesian Approach Data Mining Database Clustering and Phishing Attack.