2019
DOI: 10.4108/eai.13-7-2018.158529
|View full text |Cite
|
Sign up to set email alerts
|

Email Phishing: An Enhanced Classification Model to Detect Malicious URLs

Abstract: Phishing is the process of enticing people into visiting fraudulent websites and persuading them to enter their personal information. Number in phishing email are spread with the aim of making web users believe that they are communicating with a trusted entity or organization. Phishing is deployed by the use of advanced and harmful tactics like malicious or phishing URLs. So, it becomes necessary to detect malicious or phishing URLs in the present scenario. Numerous antiphishing techniques are in vogue to disc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 15 publications
0
10
1
Order By: Relevance
“…Anti-Phishing Multi-Filter (APMF) is developed with 25 heuristics that work as multi-layer filters. 7 APMF consists of five layers which are used to discriminate between the legitimate and phished URLs. APMF is consist of five layers, that is, Page Ranking, URL Property Values, Suspicious URL Forms or Patterns, Google suggestion for URL Authenticity and Social Feature Set (social human factor scanner) to identify the known and unknown phishing.…”
Section: Proposed Approach For E-mail Phishing Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Anti-Phishing Multi-Filter (APMF) is developed with 25 heuristics that work as multi-layer filters. 7 APMF consists of five layers which are used to discriminate between the legitimate and phished URLs. APMF is consist of five layers, that is, Page Ranking, URL Property Values, Suspicious URL Forms or Patterns, Google suggestion for URL Authenticity and Social Feature Set (social human factor scanner) to identify the known and unknown phishing.…”
Section: Proposed Approach For E-mail Phishing Detectionmentioning
confidence: 99%
“…Pertinent 25 heuristics is identified through the exhaustive literature review, statistical investigations and analysis on phished and legitimate URLs/websites. 7,13 The implementation of this model is done in two phases. In phase I, Backpropagation learning algorithm and TRAINLIM (ie, Levenberg-Marquardt [LM] backpropagation) algorithm is employed.…”
Section: Proposed Approach For E-mail Phishing Detectionmentioning
confidence: 99%
See 3 more Smart Citations