Demonstrating Different Phishing Attacks Using Fuzzy Logic
Title | Demonstrating Different Phishing Attacks Using Fuzzy Logic |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shirsat, S. D. |
Conference Name | 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) |
Date Published | April 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-1974-2 |
Keywords | bank account details, Bars, Classification algorithms, Computer crime, data mining, Defuzzification, Electronic mail, Fraudulent, fraudulent websites, Fuzzy logic, global security, indexing, legitimate websites, malicious website, Membership functions, Metrics, online banking passwords, pagerank, phishing, phishing attacks, Phishing Detection, phishing sites, pubcrawl, resilience, Resiliency, security, security of data, Uniform resource locators, unsolicited e-mail, Web sites |
Abstract | Phishing has increased tremendously over last few years and it has become a serious threat to global security and economy. Existing literature dealing with the problem of phishing is scarce. Phishing is a deception technique that uses a combination of technology and social engineering to acquire sensitive information such as online banking passwords, credit card or bank account details [2]. Phishing can be done through emails and websites to collect confidential information. Phishers design fraudulent websites which look similar to the legitimate websites and lure the user to visit the malicious website. Therefore, the users must be aware of malicious websites to protect their sensitive data [1]. But it is very difficult to distinguish between legitimate and fake website especially for nontechnical users [4]. Moreover, phishing sites are growing rapidly. The aim of this paper is to demonstrate phishing detection using fuzzy logic and interpreting results using different defuzzification methods. |
URL | https://ieeexplore.ieee.org/document/8473309 |
DOI | 10.1109/ICICCT.2018.8473309 |
Citation Key | shirsat_demonstrating_2018 |
- Metrics
- Web sites
- unsolicited e-mail
- Uniform resource locators
- security of data
- security
- Resiliency
- resilience
- pubcrawl
- phishing sites
- Phishing Detection
- phishing attacks
- Phishing
- pagerank
- online banking passwords
- bank account details
- Membership functions
- malicious website
- legitimate websites
- indexing
- global security
- Fuzzy logic
- fraudulent websites
- Fraudulent
- Electronic mail
- Defuzzification
- Data mining
- Computer crime
- Classification algorithms
- Bars