Volume 20 No 12 (2022)
 Download PDF
A Cloud based Framework for Phishing Websites Detection Using Machine Learning Techniques
Yasmeen, Dr. Prasadu peddi
Abstract
Over a billion subscribers are served by cloud hosting services, which give them stable, affordable, dependable, high-speed, and internationally accessible resource access. Users frequently watch out for warning indicators of phishing attacks, such as websites with suspicious-looking domain names or those that lack an HTTPS certificate. Phishers often utilize social engineering tactics or create false websites to deceive their victims into divulging sensitive information such as account IDs, usernames, and passwords. This information can be used to steal money from individuals and corporations. Phishers have devised techniques to get around the many strategies to detect phishing websites. Nonetheless, these strategies have been put in place. Machine learning is one of the most effective methods for identifying potentially harmful behaviors. This is done so that approaches based on machine learning can identify the common features shared by the vast majority of phishing attacks. This research intends to train machine learning models and deep neural networks using the dataset produced to identify phishing websites. It is necessary to gather both phishing and benign URLs of websites to generate a dataset from which it will be possible to derive the required URLand website content-based features. In this work, we compared the accuracy of the predictions made by several different machine-learning approaches for detecting phishing websites
Keywords
Cybercrime, Machine learning, Cloud, Phishing attacks, Classification
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.