首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing
  • 本地全文:下载
  • 作者:Abhishek Kumar ; Jyotir Moy Chatterjee ; Vicente García Díaz
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2020
  • 卷号:10
  • 期号:1
  • 页码:486-493
  • DOI:10.11591/ijece.v10i1.pp486-493
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:Phishing attacks are one of the slanting cyber-attacks that apply socially engineered messages that are imparted to individuals from expert hackers going for tricking clients to uncover their delicate data, the most mainstream correspondence channel to those messages is through clients' emails. Phishing has turned into a generous danger for web clients and a noteworthy reason for money related misfortunes. Therefore, different arrangements have been created to handle this issue. Deceitful emails, also called phishing emails, utilize a scope of impact strategies to convince people to react, for example, promising a fiscal reward or summoning a feeling of criticalness. Regardless of far reaching alerts and intends to instruct clients to distinguish phishing sends, these are as yet a pervasive practice and a worthwhile business. The creators accept that influence, as a style of human correspondence intended to impact others, has a focal job in fruitful advanced tricks. Cyber criminals have ceaselessly propelling their techniques for assault. The current strategies to recognize the presence of such malevolent projects and to keep them from executing are static, dynamic and hybrid analysis. In this work we are proposing a hybrid methodology for phishing detection incorporating feature extraction and classification of the mails using SVM. At last, alongside the chose features, the PNN characterizes the spam mails from the genuine mails with more exactness and accuracy.
  • 关键词:Phishing detection;SVM;Feature Extraction;Fraudulent Emails;Hybrid Method;Phishing Attacks
国家哲学社会科学文献中心版权所有