Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8239
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGandotra, Ekta-
dc.contributor.authorGupta, Deepak-
dc.date.accessioned2022-11-09T06:46:40Z-
dc.date.available2022-11-09T06:46:40Z-
dc.date.issued2021-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8239-
dc.description.abstractDue to the availability of Internet at low price, people are shifting to online platforms instead of visiting banks, shops, etc. Attackers are taking advantage of this fact and trying to find their victims online to make money instead of taking risks to rob banks/shops, etc. They are making use of various attacks like phishing to steal the passwords, credit card details, etc., by misleading users to visit malicious and fake websites. Phishing attack is one of the top security threats on the Internet today. Attackers tend to gather victims’ confidential information using fake websites. According to Anti-Phishing Working Group [1], the trend of phishing attacks is increasing every year and 138,328 phishing pages were informed in 2018, 4th quarter. It causes a lot of financial losses. On the basis of the cases informed to Federal of Investigation [2], there occurred a loss of around $48 million in USA in the year 2018. In addition, phishing attacks are also becoming the top delivery method of malware [3–5]. A recent report of Microsoft security intelligence [6] reported that in 2018, phishing attack was the top web attack.en_US
dc.language.isoenen_US
dc.publisherSpringer Nature Singapore Pte Ltd.en_US
dc.subjectPhishing detectionen_US
dc.subjectMachine learningen_US
dc.titleAn Efficient Approach for Phishing Detection using Machine Learningen_US
dc.typeBook chapteren_US
Appears in Collections:Book Chapters

Files in This Item:
File Description SizeFormat 
An Efficient Approach for Phishing Detection using Machine Learning.pdf553.82 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.