Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/3402
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPatil, Harshal-
dc.contributor.authorPatil, Abhishek-
dc.contributor.authorSavkar, Tejaswini-
dc.date.accessioned2022-08-08T08:39:11Z-
dc.date.available2022-08-08T08:39:11Z-
dc.date.issued2022-05-25-
dc.identifier.urihttp://192.168.3.232:8080/jspui/handle/123456789/3402-
dc.description.abstractInternet has been a huge part of our day to day life. Since we are highly depended on Internet for all our daily activities, we are prone to cybercrimes. URL-based phishing attacks are one of the major threats facing by internet users. It is a way of fraudulent communication to steal the confidential data of user.Attackers mainly target people and reputed organizations, by tricking them to click on the URLs that seems to be secured and hence steal personal information of user or by injecting malware into machines.Researchers are constantly making several attempts to improve the accuracy and make model efficient. In this paper, we aim to study and review various machine learning algorithms along with the datasets, that are usedto detect legitimacy of the URL.The paper also provides statistical information about performance of the model. Our objective is to create a survey aid for researchers to examine the latest trends of phishing attacks and contributein building phishing detection models that yield greater accuracy.en_US
dc.subjectPhishingen_US
dc.subjectLegitimateen_US
dc.subjectURL featuresen_US
dc.subjectmachine learningen_US
dc.subjectphishing detectionen_US
dc.titleSurvey: Approaches for Phishing Detectionen_US
Appears in Collections:Computer

Files in This Item:
File Description SizeFormat 
PID 23 IJARCCE.2022.11552.pdf196.12 kBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.