[{“box”:0,”content”:”[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n
n
n
n
n

n
S. Umamaheswari, S. Saranya,
n
- n t
n
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Professor, Professor Department of Information Technology, C. Abdul Hakeem College of Engineering and Technology/Anna University, Department of Information Technology, C. Abdul Hakeem College of Engineering and Technology/Anna University Tamil Nadu, Tamil Nadu India, India
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
nThe goal of the abstract is to offer an automated method that uses login URLs to identify real-world scenarios. Phishing is a type of cyberattack that involves social engineering, when malefactors trick victims into providing their login credentials via a login form that sends the information to a hostile site. In this research, we offer a system that uses URL analysis to detect phishing websites by comparing machine learning and deep learning methodologies. The legitimate class in the majority of modern state-of-the-art phishing detection technologies consists of homepages without login fields. Instead, we utilize the login page URL in both classes, since we believe it to be a lot more realistic case scenario, and we show that testing with legitimate login page URLs yields a significant false-positive rate for existing methodologies. Additionally, we train a base model with old datasets and test it with new URLs, using datasets from different years to illustrate how models lose accuracy with time. Additionally, we run a frequency analysis across active phishing domains to find various tactics used by phishers in their campaigns. In order to validate these claims, we have developed a new dataset called Phishing Index Login URL (PILU-90K), which consists of 30K phishing URLs and 60K authentic URLs, such as index and login webpages.
n
Keywords: Phishing index, Frequency, traffic, PyCharm, python libraries, naïve bayes
n[if 424 equals=”Regular Issue”][This article belongs to Journal of Telecommunication, Switching Systems and Networks(jotssn)]
n
n
n
n
n
nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n
nn[if 379 not_equal=””]n
Browse Figures
n
n
n[/if 379]n
References
n[if 1104 equals=””]n
- Maddireddy BR, Maddireddy BR. AI-Based Phishing Detection Techniques: A Comparative Analysis of Model Performance. Unique Endeavor in Business & Social Sciences. 2022 Jun 30;1(2):63-77.
- Alkhalil Z, Hewage C, Nawaf L, Khan I. Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science. 2021 Mar 9;3:563060.
- Alzahrani A. Coronavirus social engineering attacks: Issues and recommendations. International Journal of Advanced Computer Science and Applications. 2020;11(5).
- Pandey N, Pal A. Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International journal of information management. 2020 Dec 1;55:102171.
- Patel P, Sarno DM, Lewis JE, Shoss M, Neider MB, Bohil CJ. Perceptual representation of spam and phishing emails. Applied cognitive psychology. 2019 Nov;33(6):1296-304.
- Chaudhry JA, Chaudhry SA, Rittenhouse RG. Phishing attacks and defenses. International journal of security and its applications. 2016 Jan 1;10(1):247-56.
- Hijji M, Alam G. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. Ieee Access. 2021 Jan 1;9:7152-69.
- Sahingoz OK, Buber E, Demir O, Diri B. Machine learning based phishing detection from URLs. Expert Systems with Applications. 2019 Mar 1;117:345-57.
- Rao RS, Pais AR. Jail-Phish: An improved search engine based phishing detection system. Computers & Security. 2019 Jun 1;83:246-67.
- Ramanathan V, Wechsler H. phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training. EURASIP Journal on Information Security. 2012 Dec;2012:1-22.
- Jakobsson M, Myers S, editors. Phishing and countermeasures: understanding the increasing problem of electronic identity theft. John Wiley & Sons; 2006 Dec 5.
- Zhang W, Gupta S, Lian X, Liu J. Staleness-aware async-sgd for distributed deep learning. arXiv preprint arXiv:1511.05950. 2015 Nov 18.
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
nn
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n

n
Journal of Telecommunication, Switching Systems and Networks
n
n
n
n
n
n
| Volume | 11 | |
| [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 02 | |
| Received | July 6, 2024 | |
| Accepted | July 10, 2024 | |
| Published | July 23, 2024 |
n
n
n
n
n
n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]
