Phishing is a cyber-attack on unsuspecting Web users that try to provide confidential information such login, password, social welfare, and credit card data. Attackers impersonate Internet users as a trustworthy or reliable website in order to collect personal details. Phishing is one of the most dangerous Internet crimes and may have huge and negative implications for online business. The problems of phishing assaults are growing considerably in recent years. The phisher constructs a fake or phishing website in a web phishing assault to mislead online users to steal sensitive financial and personal information. In addition to dealing with this difficulty, several standard website detection approaches have been presented. Attackers would typically evade existing URL-based phishing protection systems or page content. This paper explores if a website is authentic or complete and helps to increase website identification accuracy. A selection technique for features is therefore used and incorporated in a majority-voting artificial intelligence approach and is compared with several model classifications, such as a decision tree, a vector support machine, and a navy classifier.

1.
Maher
Aburrous
,
M. A.
Hossain
,
Keshav
Dahal
,
Fadi
Thabtah
, “
Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies
,”
IEEE conference
,
2010
.
2.
Hu
,
H.
, &
Wang
,
G.
, “
End-to-end measurements of email spoofing attacks
,”
In 27th {USENIX} Security Symposium ({USENIX} Security 18
), pp.
1095
1112
,
2018
.
3.
Williams
,
E. J.
, &
Polage
,
D.
, “
How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
,”
Behaviour & Information Technology
,
38
(
2
),
184
197
,
2019
.
4.
P.
Kshirsagar
and
S.
Akojwar
, “
Classification & Detection of Neurological Disorders using ICA & AR as Feature Extractor
",
Int. J. Ser. Eng. Sci. IJSES
, vol.
1
, no.
1, Jan
.
2015
.
5.
Volkamer
,
M.
,
Renaud
,
K.
,
Reinheimer
,
B.
, &
Kunz
,
A
, “
User experiences of TORPEDO: tooltip-powered phishing email detection
,”
Computers & Security, 71, 100-113
,
2017
.
6.
Santhana
Lakshmi
V,
Vijaya
MS
., “
Efficient prediction of phishing websites using supervised learning algorithms
,”
ELSEVIER
, pp.
798
805
,
2012
.
7.
Arun
Kulkarni
Phishing Websites Detection using Machine Learning
(IJACSA) International Journal of Advanced Computer Science and Applications
, vol.
10
, no.
7
,
2019
,pp.
8
13
8.
Pravin
Kshirsagar
,
Dr.
SudhirAkojwar
, “
Classification and Prediction of Epilepsy using FFBPNN with PSO
",
IEEE International Conference on Communication Networks
,
2015
.
9.
Waleed
Ali
Phishing Website Detection based on Supervised Machine Learning with Wrapper Features Selection
(IJACSA) International Journal of Advanced Computer Science and Applications
, vol.
8
, no.
9
,
2017
,pp.
72
78
.
10.
P.
Kshirsagar
,
S.
Akojwar
,
Nidhi D.
Bajaj
, “
A hybridised neural network and optimisation algorithms for prediction and classification of neurological disorders
International Journal of Biomedical Engineering and Technology
,vol.
28
,Issue
4
,
2018
.
11.
P.
Kshirsagar
and
S.
Akojwar
, “
Novel approach for classification and prediction of non linear chaotic databases
,”
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT
),
2016
, pp.
514
518
, doi: ,2016
12.
Andronicus A.
Akinyelu
and
Aderemi O.
Adewumi
., “Classification of Phishing Email Using Random Forest Machine Learning Technique,”
Hindawi Publishing Corporation
,
Journal of Applied Mathematics
,
2014
13.
Alyssa Anne
Ubing
Phishing Website Detection: An Improved Accuracy through Feature Selection and Ensemble Learning
(IJACSA) International Journal of Advanced Computer Science and Applications
, vol.
10
, no.
1
,
2019
,pp.
252
257
14.
Kshirsagar
,
P.R.
,
Akojwar
,
S.G.
,
Dhanoriya
,
R
, “
Classification of ECG-signals using artificial neural networks
",
In: Proceedings of International Conference on Intelligent Technologies and Engineering Systems, Lecture Notes in Electrical Engineering
, vol.
345
.
Springer, Cham
(
2014
).
15.
P.
Kshirsagar
and
S.
Akojwar
, “
Optimization of BPNN parameters using PSO for EEG signals
,”
ICCASP/ICMMD-2016. Advances in Intelligent Systems Research
. vol.
137
, Pp.
385
394
,
2016
16.
R. M.
Mohammad
,
F.
Thabtah
, and
L.
McCluskey
, “
An Assessment of Features Related to Phishing Websites using an Automated Technique
.” pp.
492
497
,
2012
.
17.
Pravin
Kshirsagar
,
Nagaraj
Balakrishnan
&
Arpit Deepak
Yadav
Modelling of optimised neural network for classification and prediction of benchmark datasets
",
Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization
,
8
:
4
,
426
435
, DOI:
18.
Dr. Sudhir
Akojwar
,
Pravin
Kshirsagar
,
Vijetalaxmi
Pai
Feature Extraction of EEG Signals using Wavelet and Principal Component analysis
",
National Conference on Research Trends In Electronics, Computer Science & Information Technology and Doctoral Research Meet, Feb 21st & 22nd
,
2014
.
19.
S.
Akojwar
and
P.
Kshirsagar
, “
A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems
",
Wseas Transactions on Electronics
, vol.
7
, pp.
79
84
,
2016
.
20.
Sudhir G.
Akojwar
,
Pravin R.
Kshirsagar
, “
Performance Evolution of Optimization Techniques for Mathematical Benchmark Functions
".
International Journal of Computers
,
1
,
231
236
,
2016
.
21.
.
M.
Krishnan
and
V.
Subramaniyaswamy
, “
Phishing website detection system based on enhanced itree classifier
,”
ARPN J. Eng. Appl. Sci
., vol.
10
, no.
14
, pp.
5688
5699
,
2015
22.
M. A. U. H.
Tahir
,
S.
Asghar
,
A.
Zafar
,
S.
Gillani
, “
A Hybrid Model to Detect Phishing-Sites Using Supervised Learning Algorithms
,”
International Conference on Computational Science and Computational Intelligence (CSCI
), pp.
1126
-
1133
, IEEE,
2016
.
23.
Sumit
Gangwal
,
Dr. V P
Singh
,
08-10-2015, International Conference on Soft Computing Techniques & Implementation, ICSTI
2015
IEEE, Faridabad, India, “
Intrusion detection system using machine learning models
".
24.
Radhika Rani
Chintala
,
Narasinga Rao
M R
,
Somu
Venkateswarlu
,
IJPAM
,
2015
, “
Implementation & Performance Analysis of Security in Human Sensor Networks
".
25.
Chintala
R R
,
Narasingarao
M R
,
Venkateswarlu
S
,
IJET (UAE)
,
2018
, “
Review on the Security issues in Human Sensor Networks for Health Care Applications
".
26.
Leena A
Deshpande
,
M R Narasinga
Rao
,
Journal of Engineering Science and Technology
,
2019
,"
Addressing Social Popularity in Twitter Data Using Drift Detection Technique
".
27.
K Swetha
,
M R
Narasinga
Rao
,
Asian Journal of Information Technology
,
2016
, “
Dynamic Searchable Encryption over Distributed Cloud Storage
".
28.
A Seenu
,
M R Narasingarao
,
U S S
Padmajyothi
,
International Journal of Advance Research in Computer Science
,
2014
, “
A System for Personal Information Management Using an Efficient Multidimesional Fuzzy Search
".
29.
Gaikwad Kiran
P
,
Dr. C M
Sheela Rani
,
International Journal of Scientific & Technology Research
,
2020
, “
Regression Model with Modified Linear Discriminant Analysis Features for Bimodel Emotion Recognition
".
30.
Mr. Prashant
MininathMane
,
Dr. C M Sheela
Rani
,
IJPAM
,
2018
, “
Triple Data Encryption Algorithm based Multiple Authority Access Control in Cloud System Using Optional Threshold
".
31.
D V Manasa
,
M R
Narasinga
Rao
,
A S
Lalitha
,
International Journal of Applied Engineering and Research
,
2014
, “
Analyzing the Services and Privacy Conflict Resolutions of Shared Data in OSNs
".
32.
Swathi
Karkarlapudi
,
M R
Narasinga Rao
,
International Journal of Science and Advanced Technology
,
2011
, “
A Novel Facial Recognition Model Using an Artificial Neural Networks
".
This content is only available via PDF.
You do not currently have access to this content.