Downloads provided by UsageCounts
{"references": ["R. Gowri, V Karamchand Gandhi, M. Suriakala (2017), \"An efficient algorithm to identify phishing sites using url domain features\", Int. J. of Adv. Res. in Com. Sci., Volume 8, Issue 7, pp. 508\u2013510, DOI: 10.26483/ijarcs.v8i7.4309", "U. Naresh, U. Vidya Sagar, C.V. Madhusudan (2013), \"Intelligent phishing website detection and prevention system by using link guard algorithm\", IOSR J. of Com. Eng., Volume 14, Issue 3, pp. 28\u201336, DOI: 10.9790/0661-1432836", "Maher Aburrous, Mohamad Alamgir Hossain, Keshav Prasad Dahal, Fadi Thabtah (7\u201311 September, 2009), \"Modeling intelligent phishing detection system for e banking using fuzzy data mining\" International Conference on CyberWorlds, Bradford, West Yorkshire, UK", "Moh'd Iqbal AL Ajlouni, Wa'el Hadi, Jaber Alwedya (2013), \"Detecting phishing websites using associative classification\" Euro. J. of Busi. and Mgmt., Volume 5, Issue 15, pp. 36\u201340", "Muhammet Baykara, Zahit Ziya G\u00fcrel (22\u201325 March, 2018), \"Detection of phishing attacks\", International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey"]}
Spoofing websites are fake websites those are created by hackers or intruders to get real information from the users. They look like real websites. With the emerging use of internet, there is an increase in the number of people who are depending on online services to shop, check their banking account, pay their bills or even play with anonymous friends. The major security drawback in today’s world is spoofing attacks. It is a kind of attack through emails. The goal is to trick the email recipient into believing that the message is something they want or need a request from their bank, for instance or a note from someone in their company and to click a link or download an attachment will proceed with the collection of dataset, pre-processing of dataset and URL. The model is trained by Machine Learning algorithms. Finally, we analyze whether the website is legitimate or not legitimate. The analysis is given in confusion matrix and accuracy of all algorithms.
Flask model, ML, spoofing, SVM, URL, http://matjournals.com/Engineering-Journals.html
Flask model, ML, spoofing, SVM, URL, http://matjournals.com/Engineering-Journals.html
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 3 |

Views provided by UsageCounts
Downloads provided by UsageCounts