2019
DOI: 10.1587/transinf.2018nti0001
|View full text |Cite
|
Sign up to set email alerts
|

AI@ntiPhish — Machine Learning Mechanisms for Cyber-Phishing Attack

Abstract: This study proposes a novel machine learning architecture and various learning algorithms to build-in anti-phishing services for avoiding cyber-phishing attack. For the rapid develop of information technology, hackers engage in cyber-phishing attack to steal important personal information, which draws information security concerns. The prevention of phishing website involves in various aspect, for example, user training, public awareness, fraudulent phishing, etc. However, recent phishing research has mainly f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…And, The performance evaluation uses the Iteration value against the cross-validation technique, which is 100. This follows the recommendations from [19] and [37] to obtain maximum performance results accurately. The experimental setting of the subset scheme is shown in Table I.…”
Section: B Proposed Subset Schemesmentioning
confidence: 86%
See 2 more Smart Citations
“…And, The performance evaluation uses the Iteration value against the cross-validation technique, which is 100. This follows the recommendations from [19] and [37] to obtain maximum performance results accurately. The experimental setting of the subset scheme is shown in Table I.…”
Section: B Proposed Subset Schemesmentioning
confidence: 86%
“…MLP is only exceptional on an unbalanced dataset of phishing websites [18]. C4.5 performs best when a phishing webpage balanced and URL unbalanced datasets are used [19], [20]. Similarly, Naïve Bayes exhibits its best performance on a phishing SMS unbalanced dataset [21].…”
Section: Selection Of Phishing Classification Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…They used ML algorithms such as DT, RF, Gradient Boosting (GBM), Generalized Linear Model (GLM), and PCA. The authors in Chen and Chen [ 17 ] used the SMOTE method which improves the detection coverage of the model. They trained machine learning models including bagging, RF, and XGboost.…”
Section: Literature Surveymentioning
confidence: 99%
“…As a new machine learning method, the XGBoost (eXtreme Gradient Boost) method was firstly introduced by Chen [37] in 2016, and has been used in many other applications, such as automotive manufacturing [38], predicting building cooling load [39] and fault detection for HVAC systems [40]. In existing studies, much evidence was available about its advantages (stability, accuracy and efficiency) in modeling complex process over other conventional machine learning methods, such as SVM algorithm [41,42], logistic regression method [43][44][45][46][47][48][49] and KNN/decision tree [50,51]. This study, therefore, was designed to justify its contribution to modeling accuracy of occupant window behavior in buildings, mainly against the most conventional modeling approach, i.e.…”
Section: Introductionmentioning
confidence: 99%