0% found this document useful (0 votes)
86 views1 page

Phishing Websites Features Classification Based On Extreme Learning Machine

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 1

Phishing websites features classification based on extreme

learning machine
Phishing are one of the most common and most dangerous attacks among
cybercrimes. The aim of these attacks is to steal the information used by individuals
and organizations to conduct transactions. Phishing websites contain various hints
among their contents and web browser-based information. The purpose of this
project is to perform Extreme Learning Machine (ELM) based classification for 30
features including Phishing Websites Data in UC Irvine Machine Learning
Repository database. For results assessment, ELM was compared with other
machine learning methods such as Support Vector Machine (SVM), Naïve Bayes
(NB) and detected to have the highest accuracy.

Phishing websites is a semantic attack which targets the user rather than the
computer. It is a relatively new Internet crime in comparison with other forms, e.g.,
virus and hacking. The phishing problem is a hard problem because of the fact that
it is very easy for an attacker to create an exact replica of a good banking site, which
looks very convincing to users. The word phishing from the phrase “website
phishing” is a variation on the word “fishing”.

In this project the features of phishing attack are designed and a


classification model has been proposed for classification of the phishing attacks.
This method consists of feature extraction from websites and classification.In the
feature extraction, there are clearly defined rules of phishing feature extraction and
these rules have been used for obtaining features. In order to classification of these
feature, SVM, NB and ELM have been used.

The purpose of the project is to classify susceptible websites into phishing


and legitimate websites by the use of Extreme Learning Machine algorithm.The
project also verifies the accuracy of the ELM in comparison to Naive Bayes and
Support Vector Machine.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy