2015
DOI: 10.5120/19565-1326
|View full text |Cite
|
Sign up to set email alerts
|

Kernel k-Means Clustering for Phishing Website and Malware Categorization

Abstract: In these days there are two famous internet attacks these are malware and phishing. Malware stands for malicious software. It is designed to damage computer system without knowledge of the user. Phishing website is comparatively new internet crime to malware attack. Phishing is a form of online fraud such as social engineering schemes by sending e-mails, sudden message or online advertising attract users to phishing website that pretend to be trustworthy website in order to trick individuals sensitive informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…They treat phishing webpage detection as a classification or clustering problem, and use the corresponding machine learning algorithms to build detection models [8]. Among them, the clustering methods first divide the webpages into several clusters, and then distinguish the phishing webpages from the benign webpages by marking the clusters [9]. On the other hand, the classification methods construct classifiers according to the characteristics of the labeled samples, and then map the unlabeled samples to phishing or benign [10,11].…”
Section: A Traditional Phishing Webpage Detection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…They treat phishing webpage detection as a classification or clustering problem, and use the corresponding machine learning algorithms to build detection models [8]. Among them, the clustering methods first divide the webpages into several clusters, and then distinguish the phishing webpages from the benign webpages by marking the clusters [9]. On the other hand, the classification methods construct classifiers according to the characteristics of the labeled samples, and then map the unlabeled samples to phishing or benign [10,11].…”
Section: A Traditional Phishing Webpage Detection Methodsmentioning
confidence: 99%
“…In order to resist evasion attacks from attackers, the number of extracted features is increasing. For example, Google Chrome has extracted 2130-dimensional features for phishing detection [9], which greatly increases the complexity of modeling, but leaves the detection efficiency to be improved. At the same time, these techniques are bypassed by the attackers once the algorithms or features are known to the phisher.…”
Section: A Traditional Phishing Webpage Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation