Loading

URL Based Phishing Detection
Neeraja Koppula1, Vrinda Prabhakaram Ganti2, Pranith Gandhe3

1Neeraja Koppula, Associate Professor, Department of Information Technology, MLR Institute of technology, Hyderabad, India.
2Vrinda Prabhakaram Ganti, Department of Information Technology, MLR Institute of technology, Hyderabad, India.
3Pranith Gandhe, Department of Information Technology, MLR Institute of technology, Hyderabad, India. 

Manuscript received on April 30, 2020. | Revised Manuscript received on May 06, 2020. | Manuscript published on May 30, 2020. | PP: 1872-1875 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2657059120/2020©BEIESP | DOI: 10.35940/ijrte.A2657.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Damage caused due to phishing attacks is that which targets the user’s personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people affecting have continued to grow. The aim of a technique for phishing detection using machine learning to identify each URL into either a legitimate URL or a phished URL. Data availability here in this proposed solution is the key to executing the solution and if there is any issue with data availability it can cost the project accuracy. Data used for model testing must be reliable and appropriate to almost identify all the websites that the user wants to check. Model consistency is another factor that may trigger project failure so the model has to be accurate in determining a true identity of URLs. This technique employs features of a standardized resource locator (URL). The features have been defined which contain URLs for the phishing site. The suggested approach employs certain characteristics to detect phishing. The strategy was tested with a data collection of 3,000 URLs for the phishing site and 3,000 valid URLs for the site. The findings show that more than 90 percent of phishing sites can be identified by the proposed technique. 
Keywords: Phishing, ID3, PhishTank, Legitimate URLs, Phishing URLs.
Scope of the Article: IoT