A System Review on Fraudulent Website Detection Using Machine Learning Technique
At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach can strengthen the Internet’s legitimacy and impose sanctions on criminals who eng...
Gespeichert in:
Veröffentlicht in: | SN computer science 2023-11, Vol.4 (6), p.702, Article 702 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 6 |
container_start_page | 702 |
container_title | SN computer science |
container_volume | 4 |
creator | Saraswathi, P. Anchitaalagammai, J. V. Kavitha, R. |
description | At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach can strengthen the Internet’s legitimacy and impose sanctions on criminals who engage in prohibited or malicious activities. However, governments still need a derivation to classify websites as dangerous or non-dangerous. However, several malicious and counterfeit goods are published on fraudulent websites to cheat consumers and make high and unfair profits. Due to the proliferation of such fraudulent websites, it is difficult to detect and identify them through manual inspection. Phishing attacks include various attacks, including spoofing malicious-based, DNS-based, data theft, email/spam, web-based delivery, and telephone-based phishing. We propose an integrated machine learning (ML) framework for fraudulent website detection to solve this problem. Artificial neural networks (ANN), support vector machine (SVM), random forests (RF), and K-nearest neighbor (K-NN) are algorithms to detect phishing websites accurately. Some URLs can be used to classify them as appropriate or phishing. Data from publicly available phishing websites can be collected from the UCIrvine ML repository for training and testing. Then, the results can be predicted using the features of the dataset. We conduct an in-depth literature review and propose methods for detecting phishing websites using ML methods. |
doi_str_mv | 10.1007/s42979-023-02084-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2921195778</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921195778</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1856-598157f7912abf84dc1a901c9ef92fad576b1b6a0555d09c4ef0ccaa6a6bd22d3</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWLR_wFPA82qSbpLNsVSrQkXRFo8hm520W9psTXaV_ntTV9CTh2GGmffewIfQBSVXlBB5HXOmpMoIG6UiRZ6JIzRgQtCsUEQe_5lP0TDGNSGEcZLngg_Q8xi_7mMLW_wCHzV84sbjaTBd1W3At_gNyli3gG-gBdvW6biItV_iR2NXtQc8AxP8YTEHu_L1ewfn6MSZTYThTz9Di-ntfHKfzZ7uHibjWWZpwUXGVUG5dFJRZkpX5JWlRhFqFTjFnKm4FCUthSGc84oom4Mj1hojjCgrxqrRGbrsc3ehSW9jq9dNF3x6qZlilCouZZFUrFfZ0MQYwOldqLcm7DUl-gBP9_B0gqe_4WmRTKPeFJPYLyH8Rv_j-gK4yHGy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921195778</pqid></control><display><type>article</type><title>A System Review on Fraudulent Website Detection Using Machine Learning Technique</title><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Saraswathi, P. ; Anchitaalagammai, J. V. ; Kavitha, R.</creator><creatorcontrib>Saraswathi, P. ; Anchitaalagammai, J. V. ; Kavitha, R.</creatorcontrib><description>At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach can strengthen the Internet’s legitimacy and impose sanctions on criminals who engage in prohibited or malicious activities. However, governments still need a derivation to classify websites as dangerous or non-dangerous. However, several malicious and counterfeit goods are published on fraudulent websites to cheat consumers and make high and unfair profits. Due to the proliferation of such fraudulent websites, it is difficult to detect and identify them through manual inspection. Phishing attacks include various attacks, including spoofing malicious-based, DNS-based, data theft, email/spam, web-based delivery, and telephone-based phishing. We propose an integrated machine learning (ML) framework for fraudulent website detection to solve this problem. Artificial neural networks (ANN), support vector machine (SVM), random forests (RF), and K-nearest neighbor (K-NN) are algorithms to detect phishing websites accurately. Some URLs can be used to classify them as appropriate or phishing. Data from publicly available phishing websites can be collected from the UCIrvine ML repository for training and testing. Then, the results can be predicted using the features of the dataset. We conduct an in-depth literature review and propose methods for detecting phishing websites using ML methods.</description><identifier>ISSN: 2661-8907</identifier><identifier>ISSN: 2662-995X</identifier><identifier>EISSN: 2661-8907</identifier><identifier>DOI: 10.1007/s42979-023-02084-6</identifier><language>eng</language><publisher>Singapore: Springer Nature Singapore</publisher><subject>Advances in Computational Approaches for Image Processing ; Algorithms ; Artificial neural networks ; Classification ; Cloud Applications and Network Security ; Computer Imaging ; Computer Science ; Computer Systems Organization and Communication Networks ; Counterfeit ; Data Structures and Information Theory ; Datasets ; Fraud ; Information Systems and Communication Service ; Literature reviews ; Machine learning ; Neural networks ; Original Research ; Pattern Recognition and Graphics ; Phishing ; Software Engineering/Programming and Operating Systems ; Spoofing ; Support vector machines ; Theft ; URLs ; Vision ; Websites ; Wireless Networks</subject><ispartof>SN computer science, 2023-11, Vol.4 (6), p.702, Article 702</ispartof><rights>The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1856-598157f7912abf84dc1a901c9ef92fad576b1b6a0555d09c4ef0ccaa6a6bd22d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s42979-023-02084-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2921195778?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21387,27923,27924,33743,41487,42556,43804,51318,64384,64388,72340</link.rule.ids></links><search><creatorcontrib>Saraswathi, P.</creatorcontrib><creatorcontrib>Anchitaalagammai, J. V.</creatorcontrib><creatorcontrib>Kavitha, R.</creatorcontrib><title>A System Review on Fraudulent Website Detection Using Machine Learning Technique</title><title>SN computer science</title><addtitle>SN COMPUT. SCI</addtitle><description>At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach can strengthen the Internet’s legitimacy and impose sanctions on criminals who engage in prohibited or malicious activities. However, governments still need a derivation to classify websites as dangerous or non-dangerous. However, several malicious and counterfeit goods are published on fraudulent websites to cheat consumers and make high and unfair profits. Due to the proliferation of such fraudulent websites, it is difficult to detect and identify them through manual inspection. Phishing attacks include various attacks, including spoofing malicious-based, DNS-based, data theft, email/spam, web-based delivery, and telephone-based phishing. We propose an integrated machine learning (ML) framework for fraudulent website detection to solve this problem. Artificial neural networks (ANN), support vector machine (SVM), random forests (RF), and K-nearest neighbor (K-NN) are algorithms to detect phishing websites accurately. Some URLs can be used to classify them as appropriate or phishing. Data from publicly available phishing websites can be collected from the UCIrvine ML repository for training and testing. Then, the results can be predicted using the features of the dataset. We conduct an in-depth literature review and propose methods for detecting phishing websites using ML methods.</description><subject>Advances in Computational Approaches for Image Processing</subject><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>Classification</subject><subject>Cloud Applications and Network Security</subject><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Counterfeit</subject><subject>Data Structures and Information Theory</subject><subject>Datasets</subject><subject>Fraud</subject><subject>Information Systems and Communication Service</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Neural networks</subject><subject>Original Research</subject><subject>Pattern Recognition and Graphics</subject><subject>Phishing</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Spoofing</subject><subject>Support vector machines</subject><subject>Theft</subject><subject>URLs</subject><subject>Vision</subject><subject>Websites</subject><subject>Wireless Networks</subject><issn>2661-8907</issn><issn>2662-995X</issn><issn>2661-8907</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEFLAzEQhYMoWLR_wFPA82qSbpLNsVSrQkXRFo8hm520W9psTXaV_ntTV9CTh2GGmffewIfQBSVXlBB5HXOmpMoIG6UiRZ6JIzRgQtCsUEQe_5lP0TDGNSGEcZLngg_Q8xi_7mMLW_wCHzV84sbjaTBd1W3At_gNyli3gG-gBdvW6biItV_iR2NXtQc8AxP8YTEHu_L1ewfn6MSZTYThTz9Di-ntfHKfzZ7uHibjWWZpwUXGVUG5dFJRZkpX5JWlRhFqFTjFnKm4FCUthSGc84oom4Mj1hojjCgrxqrRGbrsc3ehSW9jq9dNF3x6qZlilCouZZFUrFfZ0MQYwOldqLcm7DUl-gBP9_B0gqe_4WmRTKPeFJPYLyH8Rv_j-gK4yHGy</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Saraswathi, P.</creator><creator>Anchitaalagammai, J. V.</creator><creator>Kavitha, R.</creator><general>Springer Nature Singapore</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20231101</creationdate><title>A System Review on Fraudulent Website Detection Using Machine Learning Technique</title><author>Saraswathi, P. ; Anchitaalagammai, J. V. ; Kavitha, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1856-598157f7912abf84dc1a901c9ef92fad576b1b6a0555d09c4ef0ccaa6a6bd22d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Advances in Computational Approaches for Image Processing</topic><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>Classification</topic><topic>Cloud Applications and Network Security</topic><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Counterfeit</topic><topic>Data Structures and Information Theory</topic><topic>Datasets</topic><topic>Fraud</topic><topic>Information Systems and Communication Service</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Neural networks</topic><topic>Original Research</topic><topic>Pattern Recognition and Graphics</topic><topic>Phishing</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Spoofing</topic><topic>Support vector machines</topic><topic>Theft</topic><topic>URLs</topic><topic>Vision</topic><topic>Websites</topic><topic>Wireless Networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saraswathi, P.</creatorcontrib><creatorcontrib>Anchitaalagammai, J. V.</creatorcontrib><creatorcontrib>Kavitha, R.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>SN computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saraswathi, P.</au><au>Anchitaalagammai, J. V.</au><au>Kavitha, R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A System Review on Fraudulent Website Detection Using Machine Learning Technique</atitle><jtitle>SN computer science</jtitle><stitle>SN COMPUT. SCI</stitle><date>2023-11-01</date><risdate>2023</risdate><volume>4</volume><issue>6</issue><spage>702</spage><pages>702-</pages><artnum>702</artnum><issn>2661-8907</issn><issn>2662-995X</issn><eissn>2661-8907</eissn><abstract>At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach can strengthen the Internet’s legitimacy and impose sanctions on criminals who engage in prohibited or malicious activities. However, governments still need a derivation to classify websites as dangerous or non-dangerous. However, several malicious and counterfeit goods are published on fraudulent websites to cheat consumers and make high and unfair profits. Due to the proliferation of such fraudulent websites, it is difficult to detect and identify them through manual inspection. Phishing attacks include various attacks, including spoofing malicious-based, DNS-based, data theft, email/spam, web-based delivery, and telephone-based phishing. We propose an integrated machine learning (ML) framework for fraudulent website detection to solve this problem. Artificial neural networks (ANN), support vector machine (SVM), random forests (RF), and K-nearest neighbor (K-NN) are algorithms to detect phishing websites accurately. Some URLs can be used to classify them as appropriate or phishing. Data from publicly available phishing websites can be collected from the UCIrvine ML repository for training and testing. Then, the results can be predicted using the features of the dataset. We conduct an in-depth literature review and propose methods for detecting phishing websites using ML methods.</abstract><cop>Singapore</cop><pub>Springer Nature Singapore</pub><doi>10.1007/s42979-023-02084-6</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2661-8907 |
ispartof | SN computer science, 2023-11, Vol.4 (6), p.702, Article 702 |
issn | 2661-8907 2662-995X 2661-8907 |
language | eng |
recordid | cdi_proquest_journals_2921195778 |
source | ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Advances in Computational Approaches for Image Processing Algorithms Artificial neural networks Classification Cloud Applications and Network Security Computer Imaging Computer Science Computer Systems Organization and Communication Networks Counterfeit Data Structures and Information Theory Datasets Fraud Information Systems and Communication Service Literature reviews Machine learning Neural networks Original Research Pattern Recognition and Graphics Phishing Software Engineering/Programming and Operating Systems Spoofing Support vector machines Theft URLs Vision Websites Wireless Networks |
title | A System Review on Fraudulent Website Detection Using Machine Learning Technique |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T17%3A25%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20System%20Review%20on%20Fraudulent%20Website%20Detection%20Using%20Machine%20Learning%20Technique&rft.jtitle=SN%20computer%20science&rft.au=Saraswathi,%20P.&rft.date=2023-11-01&rft.volume=4&rft.issue=6&rft.spage=702&rft.pages=702-&rft.artnum=702&rft.issn=2661-8907&rft.eissn=2661-8907&rft_id=info:doi/10.1007/s42979-023-02084-6&rft_dat=%3Cproquest_cross%3E2921195778%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921195778&rft_id=info:pmid/&rfr_iscdi=true |