293 research outputs found

    Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems

    Get PDF
    Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only. This study analyses and combines phishing emails and phishing web-forms in a single framework, which allows feature extraction and feature model construction. The outcome should classify between phishing, suspicious, legitimate and detect emerging phishing attacks accurately. The intelligent phishing security for online approach is based on machine learning techniques, using Adaptive Neuro-Fuzzy Inference System and a combination sources from which features are extracted. An experiment was performed using two-fold cross validation method to measure the system’s accuracy. The intelligent phishing security approach achieved a higher accuracy. The finding indicates that the feature model from combined sources can detect phishing websites with a higher accuracy. This paper contributes to phishing field a combined feature which sources in a single framework. The implication is that phishing attacks evolve rapidly; therefore, regular updates and being ahead of phishing strategy is the way forward

    A Survey of Website Phishing Detection Techniques

    Get PDF
    This article surveys the literature on website phishing detection. Web Phishing lures the user to interact with the fake website. The main objective of this attack is to steal the sensitive information from the user. The attacker creates similar website that looks like original website. It allows attacker to obtain sensitive information such as username, password, credit card details etc. This paper aims to survey many of the recently proposed website phishing detection techniques. A high-level overview of various types of phishing detection techniques is also presented

    A Survey on Phishing Website Detection Using Hadoop

    Get PDF
    Phishing is an activity carried out by phishers with the aim of stealing personal data of internet users such as user IDs, password, and banking account, that data will be used for their personal interests. Average internet user will be easily trapped by phishers due to the similarity of the websites they visit to the original websites. Because there are several attributes that must be considered, most of internet user finds it difficult to distinguish between an authentic website or not. There are many ways to detecting a phishing website, but the existing phishing website detection system is too time-consuming and very dependent on the database it has. In this research, the focus of Hadoop MapReduce is to quickly retrieve some of the attributes of a phishing website that has an important role in identifying a phishing website, and then informing to users whether the website is a phishing website or not

    A Novel Method of Fraud Detection of Credit Cards by Fuzzy, LSTM, and PSO Optimization

    Get PDF
    Since online shopping has become so popular, credit card theft has skyrocketed. This makes it hard to spot fake charges on accounts. In this research, credit card fraud detection is performed using a fuzzy database. It has been considered a data mining challenge to reliably identify whether or not a transaction is legitimate. This paper discusses the LSTM method and fuzzy logic. The learning process was sped up and made more precise by using a technique called particle swarm optimization (PSO). Performance values have been compared with those of the LSTM and fuzzy logic techniques, and a PSO-based neural network has been intensively trained by increasing the number of iterations and the population, or number of swarms. It has been shown that the PSO-based algorithm yields the best result for detecting fraudulent transactions. The goal of this method is to lower the mean square error (MSE) rate of the system. PSO is a popular optimization technique that can be used to locate the optimal set of features for the credit card fraud detection system. The proposed method PSO shows less mean squared error compared with Fuzzy and LSTM techniques

    A New Incremental Decision Tree Learning for Cyber Security based on ILDA and Mahalanobis Distance

    Get PDF
    A cyber-attack detection is currently essential for computer network protection. The fundamentals of protection are to detect cyber-attack effectively with the ability to combat it in various ways and with constant data learning such as internet traffic. With these functions, each cyber-attack can be memorized and protected effectively any time. This research will present procedures for a cyber-attack detection system Incremental Decision Tree Learning (IDTL) that use the principle through Incremental Linear Discriminant Analysis (ILDA) together with Mahalanobis distance for classification of the hierarchical tree by reducing data features that enhance classification of a variety of malicious data. The proposed model can learn a new incoming datum without involving the previous learned data and discard this datum after being learned. The results of the experiments revealed that the proposed method can improve classification accuracy as compare with other methods. They showed the highest accuracy when compared to other methods. If comparing with the effectiveness of each class, it was found that the proposed method can classify both intrusion datasets and other datasets efficiently

    Adaptive neuro-fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs

    Get PDF
    Vehicular Adhoc Networks (VANET) facilitate inter-vehicle communication using their dedicated connection infrastructure. Numerous advantages and applications exist associated with this technology, with road safety particularly noteworthy. Ensuring the transportation and security of information is crucial in the majority of networks, similar to other contexts. The security of VANETs poses a significant challenge due to the presence of various types of attacks that threaten the communication infrastructure of mobile vehicles. This research paper introduces a new security scheme known as the Soft Computing-based Secure Protocol for VANET Environment (SC-SPVE) method, which aims to tackle security challenges. The SC-SPVE technique integrates an adaptive neuro-fuzzy inference system and particle swarm optimisation to identify different attacks in VANETs efficiently. The proposed SC-SPVE method yielded the following average outcomes: a throughput of 148.71 kilobits per second, a delay of 23.60 ms, a packet delivery ratio of 95.62%, a precision of 92.80%, an accuracy of 99.55%, a sensitivity of 98.25%, a specificity of 99.65%, and a detection time of 6.76 ms using the Network Simulator NS2

    Performance Evaluation of Machine Learning Techniques for Identifying Forged and Phony Uniform Resource Locators (URLs)

    Get PDF
    Since the invention of Information and Communication Technology (ICT), there has been a great shift from the erstwhile traditional approach of handling information across the globe to the usage of this innovation. The application of this initiative cut across almost all areas of human endeavours. ICT is widely utilized in education and production sectors as well as in various financial institutions. It is of note that many people are using it genuinely to carry out their day to day activities while others are using it to perform nefarious activities at the detriment of other cyber users. According to several reports which are discussed in the introductory part of this work, millions of people have become victims of fake Uniform Resource Locators (URLs) sent to their mails by spammers. Financial institutions are not left out in the monumental loss recorded through this illicit act over the years. It is worth mentioning that, despite several approaches currently in place, none could confidently be confirmed to provide the best and reliable solution. According to several research findings reported in the literature, researchers have demonstrated how machine learning algorithms could be employed to verify and confirm compromised and fake URLs in the cyberspace. Inconsistencies have however been noticed in the researchers’ findings and also their corresponding results are not dependable based on the values obtained and conclusions drawn from them. Against this backdrop, the authors carried out a comparative analysis of three learning algorithms (Naïve Bayes, Decision Tree and Logistics Regression Model) for verification of compromised, suspicious and fake URLs and determine which is the best of all based on the metrics (F-Measure, Precision and Recall) used for evaluation. Based on the confusion metrics measurement, the result obtained shows that the Decision Tree (ID3) algorithm achieves the highest values for recall, precision and f-measure. It unarguably provides efficient and credible means of maximizing the detection of compromised and malicious URLs. Finally, for future work, authors are of the opinion that two or more supervised learning algorithms can be hybridized to form a single effective and more efficient algorithm for fake URLs verification.Keywords: Learning-algorithms, Forged-URL, Phoney-URL, performance-compariso

    Hybrid Dy-NFIS & RLS equalization for ZCC code in optical-CDMA over multi-mode optical fiber

    Get PDF
    For long haul coherent optical fiber communication systems, it is significant to precisely monitor the quality of transmission links and optical signals. The channel capacity beyond Shannon limit of Single-mode optical fiber (SMOF) is achieved with the help of Multi-mode optical fiber (MMOF), where the signal is multiplexed in different spatial modes. To increase single-mode transmission capacity and to avoid a foreseen “capacity crunch”, researchers have been motivated to employ MMOF as an alternative. Furthermore, different multiplexing techniques could be applied in MMOF to improve the communication system. One of these techniques is the Optical Code Division Multiple Access (Optical-CDMA), which simplifies and decentralizes network controls to improve spectral efficiency and information security increasing flexibility in bandwidth granularity. This technique also allows synchronous and simultaneous transmission medium to be shared by many users. However, during the propagation of the data over the MMOF based on Optical-CDMA, an inevitable encountered issue is pulse dispersion, nonlinearity and MAI due to mode coupling. Moreover, pulse dispersion, nonlinearity and MAI are significant aspects for the evaluation of the performance of high-speed MMOF communication systems based on Optical-CDMA. This work suggests a hybrid algorithm based on nonlinear algorithm (Dynamic evolving neural fuzzy inference (Dy-NFIS)) and linear algorithm (Recursive least squares (RLS)) equalization for ZCC code in Optical-CDMA over MMOF. Root mean squared error (RMSE), mean squared error (MSE) and Structural Similarity index (SSIM) are used to measure performance results
    corecore