AN ENHANCEMENT OF ASSOCIATION CLASSIFICATION ALGORITHM FOR IDENTIFYING PHISHING WEBSITES
Journal Title: Indian Journal of Computer Science and Engineering - Year 2016, Vol 7, Issue 4
Abstract
Phishing is a fraudulent activity that involves attacker creating a model of an existing web page in order to get more important information similar to credit card details, passwords etc., of the users. This paper is an enhancement of the existing association classification algorithm to detect the phishing websites. We can enhance the accuracy to a greater extent by applying the association rules into classification. In addition, we can also obtain some valuable information and rules which cannot be captured by using any other classification approaches. However the rule generation procedure is very time consuming while encountering large data set. The proposed algorithm makes use of Apriori algorithm for identifying frequent itemsets and hence derives a decision tree based on the features of URL.
Authors and Affiliations
G. Parthasarathy , D. C. Tomar , K. Christina Praisy
A hybrid approach based on EP and PSO for proficient solving of Unit Commitment Problem
Unit Commitment Problem (UCP) is a nonlinear mixed integer optimization problem used in the scheduling operation of power system generating units subjected to demand and reserve requirement constraints for achieving mini...
LS and MMSE based Localization Algorithm for WSNs amid obstacles
In recent years, optimization and Wireless Sensor Networks (WSNs) are extensively used in numerous milieus and hostile topographies. In this paper, we proposed an improved localization algorithm by means of Least square...
Parallel Implementation of Similarity Measures on GPU Architecture using CUDA
Image processing and pattern recognition algorithms take more time for execution on a single core processor. Graphics Processing Unit (GPU) is more popular now-a-days due to their speed, programmability, low cost and mor...
A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susce...
Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
This paper is deliberate to provide a model for “Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method ” , It describes the state’s overall requirements regarding the acquisition and i...