Author:
Agnes Kikelomo Akinwole,Israel Oludayo Ogundele
Abstract
Phishing represents a significant and escalating threat within the cyber domain, inflicting substantial financial losses on internet users annually. This illicit practice leverages both social engineering tactics and technological means to unlawfully obtain sensitive information from individuals online. Despite numerous studies and publications exploring various methodologies to combat phishing, the number of victims continues to surge due to the inefficiencies of current security measures. The inherently anonymous and unregulated nature of the internet further compounds its susceptibility to phishing attacks. While it's commonly believed that successful phishing endeavours involve the creation of replica messages or websites to deceive users, this notion has not undergone systematic examination to identify potential vulnerabilities. This paper endeavours to fill this gap by conducting a comprehensive evaluation of phishing, synthesizing diverse research perspectives and methodologies. It introduces an innovative classification method utilizing Support Vector Machine (SVM), achieving an impressive accuracy rate of 96.4% in detecting phishing attempts. By implementing this model to distinguish between phishing and legitimate URLs, the proposed solution offers a valuable tool for individuals and organizations to promptly identify and mitigate phishing threats. The findings of this study hold significant implications for bolstering internet security measures and enhancing user awareness in navigating potentially malicious online content.
Publisher
International Journal of Innovative Science and Research Technology
Reference55 articles.
1. S. Shea, A. S. Gillis, and C. Clark, “What is Cybersecurity?,” Search Secur., 2021.
2. K. M. Bakarich and D. Baranek, “Something phish-y is going on here: A teaching case on business email compromise,” Curr. Issues Audit., vol. 14, no. 1, pp. A1–A9, 2020.
3. Razorthorn phishing report https://www.razorthorn.co.uk/wp-content/uploads/2017/01/Phishi ng-S
4. K. M. Bakarich and D. Baranek, “Something phish-y is going on here: A teaching case on business email compromise,” Curr. Issues Audit., vol. 14, no. 1, pp. A1–A9, 2020.
5. D. Gupta and R. Rani, “Improving malware detection using big data and ensemble learning,” Comput. Electr. Eng., vol. 86, p. 106729, 2020.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献