Detection of phishing websites using C4.5 data mining algorithm

dc.contributor.authorPriya, A.
dc.contributor.authorMeenakshi, E.
dc.date.accessioned2018-07-14T01:18:41Z
dc.date.accessioned2024-08-14T05:05:40Z
dc.date.available2018-07-14T01:18:41Z
dc.date.available2024-08-14T05:05:40Z
dc.date.issued2018
dc.description.abstractPhishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that to steal sensitive information of user such as password, username, pin number, etc. Victims of phishing attacks may uncover their money related delicate data to the attackers who may utilize this data for budgetary and criminal exercises. Different technical and non-technical approaches have been proposed to identify phishing sites. Non-Technical approach has no solution against the fast disappearance feature of phishing websites. Data mining technique, one of the classifications of technical approach, has shown promising results in detection of phishing websites. As compared to non-technical approaches, data mining techniques can generate classification models which can make prediction on phishing websites in real-time. In this paper analysis of C4.5 (J48) data mining algorithm has been done using WEKA tool. C4.5 is a benchmark data mining technique which can accurately identify phishing websites. A training dataset of 750 URLs has been made to train the algorithm J48, which is an implementation of C4.5 algorithm in WEKA. Testing dataset of 300 URLs is used to make prediction using the classifier generated after the training of J48. True positive rate, True negative rate, False positive rate, False negative rate, Success rate, Error rate and Accuracy are calculated after testing process. Result shows C4.5 has an accuracy of 82.6%. ? 2017 IEEE.en_US
dc.identifier.citationPriya, A., & Meenakshi, E. (2018). Detection of phishing websites using C4.5 data mining algorithm. Paper presented at the RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings.en_US
dc.identifier.doi10.1109/RTEICT.2017.8256841
dc.identifier.isbn978-1-5090-3705-6
dc.identifier.urihttps://kr.cup.edu.in/handle/32116/1292
dc.identifier.urlhttps://ieeexplore.ieee.org/document/8256841/
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.subjectBudget controlen_US
dc.subjectClassification (of information)en_US
dc.subjectComputer crimeen_US
dc.subjectStatistical testsen_US
dc.subjectWebsitesen_US
dc.subjectAccuracyen_US
dc.subjectC4.5en_US
dc.subjectError rateen_US
dc.subjectFalse negative rateen_US
dc.subjectFalse positive ratesen_US
dc.subjectTrue negative ratesen_US
dc.subjectTrue positive ratesen_US
dc.subjectWEKAen_US
dc.subjectData miningen_US
dc.titleDetection of phishing websites using C4.5 data mining algorithmen_US
dc.title.journalRTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedingsen_US
dc.typeConference Paperen_US

Files