2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2019
DOI: 10.1109/fuzz-ieee.2019.8858884
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Abstract: Phishing as one of the most well-known cybercrime activities is a deception of online users to steal their personal or confidential information by impersonating a legitimate website. Several machine learning-based strategies have been proposed to detect phishing websites. These techniques are dependent on the features extracted from the website samples. However, few studies have actually considered efficient feature selection for detecting phishing attacks. In this work, we investigate an agreement on the defi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 60 publications
(25 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…There are URL feature-based approaches [5] which look at items that are suspicious in the URL such as potential emails in a URL, number of sub domains, or the length of the URL. Page rank features [4] are another set of features that are used, this will be features which look at how search engines view the page, and if it appears on the front page or not. Alexa page rank is another popular feature in this area.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…There are URL feature-based approaches [5] which look at items that are suspicious in the URL such as potential emails in a URL, number of sub domains, or the length of the URL. Page rank features [4] are another set of features that are used, this will be features which look at how search engines view the page, and if it appears on the front page or not. Alexa page rank is another popular feature in this area.…”
Section: Related Workmentioning
confidence: 99%
“…Percentage of links that do not lead to another page (link leads to "" or "#") [8] Percentage of links that lead to an external page. [4] Page rank Domain of page appears on the front page of Google (true/false) [4] Page information…”
Section: A Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Currently, a penetration to a DB using SQL injection techniques becomes fast and quite simple thanks to specialized tools [10]. Different threats may come from various sources, some from trusted DB users, others from external ones, and some attacks are performed by the DB administrators [1], [2], [3]. Data theft is a dangerous attack.…”
Section: Introductionmentioning
confidence: 99%