Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/10161
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rao, R.S. | |
dc.contributor.author | Vaishnavi, T. | |
dc.contributor.author | Pais, A.R. | |
dc.date.accessioned | 2020-03-31T08:18:40Z | - |
dc.date.available | 2020-03-31T08:18:40Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | Journal of Ambient Intelligence and Humanized Computing, 2020, Vol.11, 2, pp.813-825 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/10161 | - |
dc.description.abstract | There exists many anti-phishing techniques which use source code-based features and third party services to detect the phishing sites. These techniques have some limitations and one of them is that they fail to handle drive-by-downloads. They also use third-party services for the detection of phishing URLs which delay the classification process. Hence, in this paper, we propose a light-weight application, CatchPhish which predicts the URL legitimacy without visiting the website. The proposed technique uses hostname, full URL, Term Frequency-Inverse Document Frequency (TF-IDF) features and phish-hinted words from the suspicious URL for the classification using the Random forest classifier. The proposed model with only TF-IDF features on our dataset achieved an accuracy of 93.25%. Experiment with TF-IDF and hand-crafted features achieved a significant accuracy of 94.26% on our dataset and an accuracy of 98.25%, 97.49% on benchmark datasets which is much better than the existing baseline models. 2019, Springer-Verlag GmbH Germany, part of Springer Nature. | en_US |
dc.title | CatchPhish: detection of phishing websites by inspecting URLs | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.