2021
DOI: 10.1016/j.heliyon.2021.e07437
|View full text |Cite
|
Sign up to set email alerts
|

Improving the phishing website detection using empirical analysis of Function Tree and its variants

Abstract: The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less safe even in the presence of powerful antivirus apps. Reports of a rise in financial damages as a result of phishing website attacks have caused grave concern. Several methods, including blacklists and machine learning-based models, have been proposed to combat … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

4
6

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 54 publications
0
9
0
Order By: Relevance
“…The CV technique can guard against data heterogeneity problems that can arise in defective datasets. Furthermore, the CV technique is known to generate models with low bias and variance [ 71 75 ]. Experimentation was carried out using the Weka machine learning library [ 76 ], R lang.…”
Section: Methodsmentioning
confidence: 99%
“…The CV technique can guard against data heterogeneity problems that can arise in defective datasets. Furthermore, the CV technique is known to generate models with low bias and variance [ 71 75 ]. Experimentation was carried out using the Weka machine learning library [ 76 ], R lang.…”
Section: Methodsmentioning
confidence: 99%
“…The Scott-Knott ESD statistical rank test is also used to ascertain the significant differences in the prediction performances of the various models studied. The Waikato Environment for Knowledge Analysis (WEKA) machine learning library [57], R programming language [58], and Origin Plot are used for the experimentation on an Intel(R) Core™ machine equipped with i7-6700, running at speed 3.4 GHz CPU with 16 GB RAM.…”
Section: Methodsmentioning
confidence: 99%
“…The links are also promoted in search engines with the use of common indexing mechanisms. If users open such links, they are directed to the specific website where scamme rs achieve their goal by gaining access to users' valuable data [10].…”
Section: Introductionmentioning
confidence: 99%