Finding Fraud Websites by Using Data Mining Techniques

Authors(2) :- Maheswari G, Madhura P

Globally the internet is been accessed by huge amount people inside their restricted domains. once the client and server exchange messages among one another, there's an activity that may be observed in log files. Log files provides a elaborated description of the activities that occur in an exceedingly network that shows the IP address, login and logout durations, the user’s behavior etc. There are many varieties of attacks occurring from the net. Our focus of analysis is on Denial of Service (DOS) attacks with the help of pattern recognition techniques in data processing. Through that the Denial of Service attack is known. Denial of service is a terribly dangerous attack that jeopardizes the IT resources of a corporation by overloading with imitation messages or multiple requests from unauthorized users. But we cannot detect the fake website in this criteria. In order to detect and predict e-banking phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy.

Authors and Affiliations

Maheswari G
Department of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupathi, Andra Pradesh, India
Madhura P
Department of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupathi, Andra Pradesh, India

Phishing websites, DOS attacks, Data mining, Association rules, cluster analysis, Log File, Cyber Crimes.

  1. Design and Implementation of Small and Medium Sports Events Management Platform for Colleges,Wang wei,Xuan Lingqiang.
  2. D. Zhang, Z. Yan, H. Jiang, and T. Kim, "A domain-feature enhanced classification model for detection of Chinese phishing e-business websites," Information & Management, 2014.
  3. G. Liu, B. Qiu, and L. Wenyin. "Automatic detection of phishing target from phishing webpage." in Pattern Recognition (ICPR), 2010 20th International Conference on. 2010. IEEE.
  4. H. Zhang, G. Liu, T. W. Chow, and W. Liu, "Textual and visual content-based anti-phishing: a Bayesian approach," Neural Networks, IEEE Transactions on, 2011. 22(10): p. 1532-1546.
  5. G. Ramesh, I. Krishnamurthi, and K. Kumar, "An efficacious method for detecting phishing webpages through target domain identification," Decision Support Systems, 2014. 61: p. 12-22.
  6. P. Garrard, V. Rentoumi, B. Gesierich, B. Miller, and M. L. Gorno-Tempini, "Machine learning approaches to diagnosis and laterality effects in semantic dementia discourse," Cortex, 2014. 55: p. 122-129.
  7. A. Abunadi, O. Akanbi and A. Zainal "Feature extraction process: A phishing detection approach." in Intelligent Systems Design and Applications 2013. ISDA 2013. 13th International Conference. ISDA.
  8. L. A. T. Nguyen, B. L. To, H. K. Nguyen, and M. H. Nguyen. "Detecting phishing web sites: A heuristic URL-based approach." in Advanced Technologies for Communications (ATC), 2013 International Conference on. 2013. IEEE.
  9. G. Xiang, J. Hong, C. P. Rose, and L. Cranor, "Cantina+: A feature-rich machine learning framework for detecting phishing web sites," ACM Transactions on Information and System Security (TISSEC), 2011. 14(2): p. 21.
  10. Y. Li, R. Xiao, J. Feng, and L. Zhao, "A semi-supervised learning approach for detection of phishing webpages," Optik-International Journal for Light and Electron Optics, 2013. 124(23): p. 6027-6033.
  11. C.-R. Huang, C.-S. Chen, and P.-C. Chung, "Contrast context histogram—An efficient discriminating local descriptor for object recog-nition and image matching," Pattern Recognit., vol. 41, no. 10, pp. 3071–3077, Oct. 2008.
  12. M. Dunlop, S. Groat, and D. Shelly. "GoldPhish: using images for content-based phishing analysis." in Internet Monitoring and Protection (ICIMP), 2010 Fifth International Conference on. 2010. IEEE.
  13. S. Afroz and R. Greenstadt. "Phishzoo: Detecting phishing websites by looking at them." in Semantic Computing (ICSC), 2011 Fifth IEEE International Conference on. 2011. IEEE.
  14. W. Zhuang, Q. Jiang, and T. Xiong. "An intelligent Anti-phishing strategy Model for Phishing website Detection." in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
  15. H. Kazemian and S. Ahmed, "Comparisons of machine learning techniques for detection.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1195-1198
Manuscript Number : CSEIT1833582
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Maheswari G, Madhura P, "Finding Fraud Websites by Using Data Mining Techniques", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1195-1198, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview