Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5425
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFathima Shafana, Abdul Raheem-
dc.contributor.authorFathima Shihnas Fanoon, Abdul Raheem-
dc.date.accessioned2021-04-01T09:25:53Z-
dc.date.available2021-04-01T09:25:53Z-
dc.date.issued2020-09-18-
dc.identifier.citationJournal of Information Systems & Information Technology Vol. 5 No. 2, 2020 pp. 61-71.en_US
dc.identifier.issn24780677-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5425-
dc.description.abstractThe rapid advancement in internet has paved way for several serious crimes, of which phishing occupies a very important place. Phishing is a form of cybercrime where an attacker mimicking a legitimate website or a person or an organization redirects the victims to steal confidential data through e-mail, malwares or some other social engineering platforms. Victims prominently suffer from financial loss and private data loss. The serious outbreak of phishing has paved way for many researches, though comprehensive and accurate solution has not been proposed so far for thwarting its impact. This paper aims to develop a resilient model to predict phishing scam by means of classification algorithms of data mining. Five algorithms were chosen for this purpose and a comparative study was undertaken for their performances, accuracy, error rate and efficiency. The rules generated from the algorithms showed up a relatively better performance than the existing phishing detection toolsen_US
dc.language.isoen_USen_US
dc.publisher© Faculty of Management and Commerce South Eastern University of Sri Lankaen_US
dc.subjectPhishingen_US
dc.subjectData Miningen_US
dc.subjectClassificationen_US
dc.subjectPARTen_US
dc.subjectWebsite Legitimacyen_US
dc.titlePredictive data mining for phishing websites: a rule based approachen_US
dc.typeArticleen_US
Appears in Collections:Vol.5 No.2 (2020)

Files in This Item:
File Description SizeFormat 
JISIT-5216.pdf421.79 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.