Identifying Phishing Attacks in Communication Networks Using Url Consistency Features
dc.authorid | Maskeliunas, Rytis/0000-0002-2809-2213 | |
dc.authorid | Misra, Sanjay/0000-0002-3556-9331 | |
dc.authorwosid | Damaševičius, Robertas/E-1387-2017 | |
dc.authorwosid | Maskeliunas, Rytis/J-7173-2017 | |
dc.authorwosid | Misra, Sanjay/K-2203-2014 | |
dc.contributor.author | Azeez, Nureni Ayofe | |
dc.contributor.author | Salaudeen, Balikis Bolanle | |
dc.contributor.author | Misra, Sanjay | |
dc.contributor.author | Damasevicius, Robertas | |
dc.contributor.author | Maskeliunas, Rytis | |
dc.contributor.other | Computer Engineering | |
dc.date.accessioned | 2024-10-06T10:58:13Z | |
dc.date.available | 2024-10-06T10:58:13Z | |
dc.date.issued | 2020 | |
dc.department | Atılım University | en_US |
dc.department-temp | [Azeez, Nureni Ayofe; Salaudeen, Balikis Bolanle] Univ Lagos, Dept Comp Sci, Lagos, Nigeria; [Misra, Sanjay] Covenant Univ, Dept Elect & Informat Engn, Ota, Nigeria; [Misra, Sanjay] Atilim Univ, Dept Comp Engn, Ankara, Turkey; [Damasevicius, Robertas; Maskeliunas, Rytis] Kaunas Univ Technol, Fac Informat, Kaunas, Lithuania | en_US |
dc.description | Maskeliunas, Rytis/0000-0002-2809-2213; Misra, Sanjay/0000-0002-3556-9331 | en_US |
dc.description.abstract | Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. | en_US |
dc.description.woscitationindex | Emerging Sources Citation Index | |
dc.identifier.citationcount | 21 | |
dc.identifier.endpage | 213 | en_US |
dc.identifier.issn | 1751-911X | |
dc.identifier.issn | 1751-9128 | |
dc.identifier.issue | 2 | en_US |
dc.identifier.scopusquality | Q3 | |
dc.identifier.startpage | 200 | en_US |
dc.identifier.uri | https://hdl.handle.net/20.500.14411/8875 | |
dc.identifier.volume | 12 | en_US |
dc.identifier.wos | WOS:000523687100004 | |
dc.institutionauthor | Mısra, Sanjay | |
dc.language.iso | en | en_US |
dc.publisher | inderscience Enterprises Ltd | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | phishing attacks | en_US |
dc.subject | risk assessment | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | digital forensics | en_US |
dc.subject | digital evidence | en_US |
dc.title | Identifying Phishing Attacks in Communication Networks Using Url Consistency Features | en_US |
dc.type | Article | en_US |
dc.wos.citedbyCount | 22 | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 53e88841-fdb7-484f-9e08-efa4e6d1a090 | |
relation.isAuthorOfPublication.latestForDiscovery | 53e88841-fdb7-484f-9e08-efa4e6d1a090 | |
relation.isOrgUnitOfPublication | e0809e2c-77a7-4f04-9cb0-4bccec9395fa | |
relation.isOrgUnitOfPublication.latestForDiscovery | e0809e2c-77a7-4f04-9cb0-4bccec9395fa |