<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>ARDRA KRISHNA</title>
<link href="http://hdl.handle.net/123456789/9902" rel="alternate"/>
<subtitle>PHISHING WEBSITE DETECTION</subtitle>
<id>http://hdl.handle.net/123456789/9902</id>
<updated>2026-04-16T18:13:50Z</updated>
<dc:date>2026-04-16T18:13:50Z</dc:date>
<entry>
<title>PHISHING WEBSITE DETECTION</title>
<link href="http://hdl.handle.net/123456789/9903" rel="alternate"/>
<author>
<name>KRISHNA, ARDRA</name>
</author>
<id>http://hdl.handle.net/123456789/9903</id>
<updated>2022-06-27T22:27:05Z</updated>
<published>2022-06-11T00:00:00Z</published>
<summary type="text">PHISHING WEBSITE DETECTION
KRISHNA, ARDRA
Phishing attack is a simplest way to obtain sensitive information from innocent&#13;
users. Aim of the phishers is to acquire critical information like username, password&#13;
and bank account details. Cyber security persons are now looking for trustworthy&#13;
and steady detection techniques for phishing websites detection. This paper deals&#13;
with machine learning technology for detection of phishing URLs by extracting and&#13;
analyzing various features of legitimate and phishing URLs. Decision Tree, random&#13;
forest and Support vector machine algorithms are used to detect phishing websites.&#13;
Aim of the paper is to detect phishing URLs as well as narrow down to best machine&#13;
learning algorithm by comparing accuracy rate, false positive and false negative rate&#13;
of each algorithm.&#13;
Nowadays Phishing becomes a main area of concern for security researchers&#13;
because it is not difficult to create the fake website which looks so close to&#13;
legitimate website. Experts can identify fake websites but not all the users can&#13;
identify the fake website and such users become the victim of phishing attack. Main&#13;
aim of the attacker is to steal banks account credentials. In United States businesses,&#13;
there is a loss of US$2billion per year because their clients become victim to&#13;
phishing . In 3rd Microsoft Computing Safer Index Report released in February&#13;
2014, it was estimated that the annual worldwide impact of phishing could be as&#13;
high as $5 billion . Phishing attacks are becoming successful because lack of user&#13;
awareness. Since phishing attack exploits the weaknesses found in users, it is very&#13;
difficult to mitigate them but it is very important to enhance phishing detection&#13;
techniques.&#13;
The general method to detect phishing websites by updating blacklisted URLs,&#13;
Internet Protocol (IP) to the antivirus database which is also known as “blacklist"&#13;
method. To evade blacklists attackers uses creative techniques to fool users by&#13;
modifying the URL to appear legitimate via obfuscation and many other simple&#13;
techniques including: fast-flux, in which proxies are automatically generated to host&#13;
the web-page; algorithmic generation of new URLs; etc.
</summary>
<dc:date>2022-06-11T00:00:00Z</dc:date>
</entry>
</feed>
