Affiliation:
1. Sai Rajeswari Institute of Technology, Proddatur, Andhra Pradesh, India
Abstract
Nowadays, digital technology has advanced faster than any previous invention, leading to widespread use of machine learning algorithms for generating predictions or decisions without explicit programming. These algorithms rely on a sample set of data, known as training data, to function effectively. However, the absence of high-quality data poses a significant challenge in machine learning, as data quality is crucial for the algorithm's performance. In phishing detection, the ultimate accuracy depends on various key features, including the URL, domain identity, security, and encryption criteria. To extract and verify these criteria from phishing data sets, we utilize regression techniques and classification algorithms. Specifically, we employ decision tree and logistic regression methods as two machine learning techniques. Logistic regression, a standard approach for binary classification problems, originates from the statistical discipline and achieves a 95% accuracy rate on trained data sets. Decision trees, a form of supervised machine learning, continuously split data based on specific parameters and consist of decision nodes and leaves, representing choices and outcomes, respectively. Decision trees achieve an 85% accuracy rate on trained data.
Reference21 articles.
1. Niruban, R., Deepa, R., Vignesh, G. D., (2020), "A novel iterative demosaicing algorithm using fuzzy based dual tree wavelet transform," Journal of Critical Reviews, vol. 7, pp. 141-145. doi:10.31838/jcr.07.09.27.
2. Rajesh G., Mercilin Raajini X., Ashoka Rajan R., Gokuldhev M., Swetha C., (2020), "A Multi-Objective Routing Optimization Using Swarm Intelligence in IoT Networks," Lecture Notes in Networks and Systems, vol. 118, no., pp. 603-613. doi:10.1007/978-981-15-3284-9_69.
3. A. Belabed, E. Aimeur, and A. Chikh, “A personalized whitelist approach for phishing webpage detection,” in Proc. 7th Int. Conf. Availability, Rel. Security (ARES), Aug. 2012, pp. 249–254.
4. T.-C. Chen, S. Dick, and J. Miller, “Detecting visually similar Web pages: Application to phishing detection,” ACM Trans. Internet Technology, vol. 10, no. 2, pp. 1–38, May 2010.
5. N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell, “Client-side defense against Web-based identity theft,” in Proc. 11th Annu. Network Distribution System Security Symp. (NDSS), 2004, pp. 1–16.