2023
DOI: 10.1109/access.2023.3252366
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Detection System Through Hybrid Machine Learning Based on URL

Abstract: Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet. Phishing utilizes email distortion as its underlying mechanism for tricky correspondences, followed by mock sites, to obtain the required data from people in question. Different studies have presented their work on the precaution, identification, and knowledge of phishin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(16 citation statements)
references
References 68 publications
0
15
0
1
Order By: Relevance
“…The k-nearest neighbors (KNN) algorithm is considered one of the most fundamental classification techniques in machine learning, specifically in supervised learning [28,29]. Using KNN can yield a respectable level of accuracy in making predictions through classification [28].…”
Section: • K-nearest Neighbormentioning
confidence: 99%
See 1 more Smart Citation
“…The k-nearest neighbors (KNN) algorithm is considered one of the most fundamental classification techniques in machine learning, specifically in supervised learning [28,29]. Using KNN can yield a respectable level of accuracy in making predictions through classification [28].…”
Section: • K-nearest Neighbormentioning
confidence: 99%
“…The KNN algorithm heavily relies on the value of k to determine the number of neighbors that should be selected based on the input data, as shown in Figure 2 [30]. The KNN algorithm is simple and easy to understand and execute [28,29]. However, as the amount of data being used increases, finding the ideal value of k causes KNN to become slower [30].…”
Section: • K-nearest Neighbormentioning
confidence: 99%
“…The mechanism is designed to generate rules automatically based on the layout similarity of website pages. Karim et al, 33 proposed a hybrid classifier based model havig both hard and soft voting to enhance anti-phishing technique. Further a canopy method is applied for feature selection with grid search optimization method in the proposed work.…”
Section: Literature Reviewmentioning
confidence: 99%
“…El-Alfy et al 26 Niakanl Ahiji et al 27 Barlow et al 28 Al-Haija et al 29 Rao et al 30 Ubing et al 31 Mao et al 32 Karim et al 33…”
Section: Checklist Issuesmentioning
confidence: 99%
“…More information and metrics are necessary to understand how a model truly performs. It is important to note that, there are limited studies on the application of DL techniques in specific cyber-attack detection domains, for instance, for phishing attacks [156], [176], [189]- [195].…”
Section: Research Gapsmentioning
confidence: 99%