Open Access   Article Go Back

A Comparative Study of Existing Data Mining Techniques for Phishing Detection

M. Shukla1 , S. Sharma2

  1. Dept. of CSE and IT, Madhav Institute of Technology and Science (RGPV University), Gwalior, India.
  2. Dept. of CSE and IT, Madhav Institute of Technology and Science (RGPV University), Gwalior, India.

Correspondence should be addressed to: shuklameenu03@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 182-187, May-2017

Online published on May 30, 2017

Copyright © M. Shukla, S. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Shukla, S. Sharma, “A Comparative Study of Existing Data Mining Techniques for Phishing Detection,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.182-187, 2017.

MLA Style Citation: M. Shukla, S. Sharma "A Comparative Study of Existing Data Mining Techniques for Phishing Detection." International Journal of Computer Sciences and Engineering 5.5 (2017): 182-187.

APA Style Citation: M. Shukla, S. Sharma, (2017). A Comparative Study of Existing Data Mining Techniques for Phishing Detection. International Journal of Computer Sciences and Engineering, 5(5), 182-187.

BibTex Style Citation:
@article{Shukla_2017,
author = {M. Shukla, S. Sharma},
title = {A Comparative Study of Existing Data Mining Techniques for Phishing Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {182-187},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1287},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1287
TI - A Comparative Study of Existing Data Mining Techniques for Phishing Detection
T2 - International Journal of Computer Sciences and Engineering
AU - M. Shukla, S. Sharma
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 182-187
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
826 456 downloads 468 downloads
  
  
           

Abstract

Nowadays phishing become a major threat on internet. Phishing is a kind of attack for defacement of website in which attacker can access sensitive information of users. Phishers are one who create website same as the trusted website with the same content and designs of the trusted website. Phishing can be done through email, websites and malicious software to get intellectual information, business secrets or military secrets etc. This paper is explored the various researches for avoiding phishing and detecting phishing symptoms. Many researchers have been proposed various methods for algorithms for avoiding all conditions with the detection of phishing using data mining techniques so that any user can use internet effectively. This paper is based on Associative Classification methods of data mining for avoidance of phishing attack.

Key-Words / Index Term

Phishing, Associative Classification, Data Mining, Avoidance methods of phishing

References

[1] Mitesh Dedakia, Khushali Mistry, “Phishing Detection using Content Based Associative Classification Data Mining”, Journal of Engineering Computers and Applied Sciences, Vol.4, No.7, pp.1-11, 2015.
[2] Jaswant Meena, Ashish Mandloi , “Classification of Data Mining Techniques for Weather Prediction”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.1, pp.21-24, 2016.
[3] Suzan Wedyan, Fadi Wedyan, “An Associative Classification Data Mining Approach for Detecting Phishing Websites”, Journal of Emerging Trends in Computing and Information Science, Vol. 4, No. 12, pp.23-37, 2013.
[4] N.M. Shekokar, Chaitali Shah, Mrunal Mahajan, Shruti Rachh, “An Ideal Approach for Detection and Prevention of Phishing Attacks”, Procedia Computer Science, Vol.4, Issue.9, pp.82-91, 2015.
[5] Rajendra Gupta, Piyush Shukla, “Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System”, I. J. Computer Network and Information Security,Vol.7, No.12, 70-77, 2015,.
[6] R.V. Patil, S.S. Sannakki, V.S. Rajpurohit, “A Survey on Classification of Liver Diseases using Image Processing and Data Mining Techniques”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.29-34, 2017.
[7] M. Aburrous, M. A. Hossain, K. Dahal, F. Thabtah, “Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies”, 2010 Seventh International Conference on Information Technology: New Generations, Las Vegas, pp. 176-181, 2010.
[8] I.H. Witten, E. Frank, “Data Mining: Practical machine learning tools and techniques (2nd Edition)”, Morgan Kaufmann, San Francisco, pp.1-32, 2005.
[9] J. Cendrowska, “PRISM: An algorithm for inducing modular rule”, International Journal of Man-Machine Studies, Vol.27, No.4, pp.349-370, 1987.
[10] J. R. Quinlan, “Improved use of continuous attributes in c4.5”, Journal of Artificial Intelligence Research, Vol.4, Issue.3, pp.77-90, 1996.
[11] Bing Liu, Wynne Hsu, Yiming Ma, “Integrating Classification and Association Rule Mining”, Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98 Plenary Presentation), New York, pp.56-73, 1998.
[12] T. Fadi, C.Peter and Y. Peng, “MCAR: Multi-class Classification based on Association Rule”, IEEE International Conference on Computer Systems and Applications, China, pp. 127-133, 2005.
[13] N. Abdelhamid, A. Ayesh, F. Thabtah, “Phishing detection based Associative classification data mining”, Expert Syst. Appl., Vol.41, Issue.13, pp.5948-5959, 1987.
[14] M. Dadkhah, M. Jazi, V. Lyashenko, “Prediction of phishing websites using classification algorithms based on weight of web pages characteristics”, J. Math. Technol., Vol.5, Issue.2, pp.24-35, 2014.
[15] R. Jabri, B. Ibrahim, “Phishing websites detection using data mining classification model”, Trans. Mach. Learn. Artif. Intell., Vol.3, Issue.4, pp.42-51, 2015.
[16] R. Alazaidah, F. Thabtah, Q. Al-Radaideh, “A multi-label classification approach based on correlations among labels”, Int. J. Adv. Comput. Sci. Appl., Vol.6, Issue.2, pp.52–59, 2015.
[17] S. Taware, C. Ghorpade, P. Shah, N. Lonkar, “Phish detect: detection of phishing websites based on associative classification”, Int. J.Adv. Res. Comput. Sci. Eng. Inf. Technol., Vol.4, Issue.3, pp.384-395, 2015.
[18] M. Antonelli, P. Ducange, F. Marcelloni, A. Segatori, “A novel associative classification model based on a fuzzy frequent pattern mining algorithm”, Expert Syst. Appl., Vol.42, Issue.4, pp.2086-2097, 2015.
[19] IRA. Hamid, Jemal Abawajy, Taihoon Kim, “Using Feature Selection and Classification Scheme for Automating Phishing Email Detection”, Studies in Informatics and Control, Vol.22, Issue.1, pp.61-70, 2013.