A Machine-Learning Approach to Phishing Detection

7 downloads 0 Views 455KB Size Report
A Machine-Learning Approach to. Phishing Detection and Defense st Edition. Authors: Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi. eBook ISBN: Paperback ...
(/)

Home (/)



SEARCH

Books & Journals (/books-and-journals)



CART

MENU

Computer Science (/catalog/?start_rank= &cat =computer-science)



Artificial Intelligence (/catalog/?start_rank= &cat =computer-science&cat =artificial-intelligence)



Machine Learning (/catalog/?start_rank= &cat =computer-science&cat =artificial-intelligence&cat =machine-lear…



A Machine-Learning Approach to Phishing Detection and Defense ()

A Machine-Learning Approach to Phishing Detection and Defense st Edition Authors: Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi eBook ISBN: Paperback ISBN: Imprint: Syngress Published Date: th December Page Count:

View on ScienceDirect (http://www.sciencedirect.com/science/book/

(https://w ww.elsevie r.com/boo ks-andjournals/d rm-freeebooks) Select country of purchase: United States of America Tax/VAT will be calculated at check-out Bundle Print & eBook

)

% off

US$ . US$ .

SEARCH

MENU

Print - Paperback % off In Stock

US$ . US$ . eBook % off

US$ . US$ . ❓

DRM-free (EPub, PDF, Mobi) eBook format help (https://service.elsevier.com/app/answers/detail/a_id/

/c/

/supporthub/ecommerce/)

Add to Cart

Institutional Access Request a Sales Quote

Tax Exempt Orders Support Center (https://service.elsevier.com/app/answers/detail/a_id/

/supporthub/ecommerce)

(https://www.elsevier.com/books-and-journals/special-offers)

🔒

Secure Checkout Personal information is secured with SSL technology.

📦

Free Shipping Free global shipping No minimum order.

SEARCH

MENU

Description Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A MachineLearning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.

Key Features • Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks • Help your business or organization avoid costly damage from phishing sources • Gain insight into machine-learning strategies for facing a variety of information security threats

Table of Contents • Abstract • List of Abbreviation • Chapter : Introduction • Abstract • . . Introduction • . . Problem background • . . Problem statement • . . Purpose of study • . . Project objectives • . . Scope of study

• . . The significance of study • . . Organization of report • Chapter : Literature Review • Abstract • . . Introduction • . . Phishing • . . Existing anti-phishing approaches • . . Existing techniques • . . Design of classifiers • . . Normalization • . . Related work • . . Summary • Chapter : Research Methodology • Abstract • . . Introduction • . . Research framework • . . Research design • . . Dataset • . . Summary • Chapter : Feature Extraction • Abstract • . . Introduction • . . Dataset processing • . . Dataset division • . . Summary • Chapter : Implementation and Result • Abstract • . . Introduction • . . An overview of the investigation • . . Training and testing model (baseline model)

SEARCH

MENU

• . . Ensemble design and voting scheme • . . Comparative study

SEARCH

MENU

• . . Summary • Chapter : Conclusions • Abstract • . . Concluding remarks • . . Research contribution • . . Research implication • . . Recommendations for future research • . . Closing note • References

Details No. of pages: Language: English Copyright: © Syngress Published: th December Imprint: Syngress eBook ISBN: Paperback ISBN:

About the Author Iraj Sadegh Amiri Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in . He was awarded a PhD degree in photonics in Jan . He has published well over academic publications since the s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.

Affiliations and Expertise

B. Sc in Applied Physics (Urmia University, Iran), M. Sc in Optics and Optoelectronics (University Technology Malaysia (UTM)), PhD in Photonics (University Technology Malaysia SEARCH (University of Malaya MENU (UTM)), Postdoctoral Researcher in Experimental Physics and Photonics (UM)), Senior Lecturer in Experimental Physics and Photonics (University of Malaya (UM))

O.A. Akanbi O.A. Akanbi received his B. Sc. (Hons, Information Technology – Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.

Affiliations and Expertise Graduate student in Computer Science at Texas Tech University

E. Fazeldehkordi E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.

Affiliations and Expertise Information Security researcher

Solutions Solutions Researchers Researchers Elsevier Elsevier Website Website

   

SEARCH

MENU

(https://www.elsevier.com)

Copyright ©

Elsevier, except certain content provided by third party

Cookies are used by this site. To decline or learn more, visit our Cookies (//www.elsevier.com/legal/use-of-cookies) page. Terms and Conditions (//www.elsevier.com/legal/elsevier-website-terms-and-conditions)

Privacy Policy

(//www.elsevier.com/legal/privacy-policy)

(https://www.elsevier.com)

(http://www.reedelsevier.com/)

(http://www.reedelsevier.com/)