SlideShare una empresa de Scribd logo
1 de 26
Presented By:
Shaikh Mussavir Ahemad
SGGS IE &T, Nanded
Intelligent Phishing detection &
protection scheme for online
Transaction
Outline
 Introduction
 Methodology
 Feature extraction & analysis
 Experimental procedures
 Conclusions & future work
 References
 Questions
Introduction
 What is phishing ?
 Phishing basics
 Phishing information flow
 Visually similar Webpages
 Growth rate of phishing sites
 Approaches of anti phishing
 Objectives of Study
What is Phishing?
Definition
 Phishing is an act to fraudulently acquire user’s sensitive
information such as password, credit/debit card number
through illegal website that look exactly like target website
Phishing basics
 Visually similar website
 Email containing time constraint
 Fake https certificate
 Attractive offers one phishing webpage
 Attractive games containing link to the phishing webpage
Figure:Phishing information flow
Visually similar websites
Growth rate of phishing sites
According to UK cards association press release report:
 Phishing attacks caused $21.6 million loss between January
& June 2012
 A growth of 28% from June 2011
 Number of websites detected by APWG 63,253 /month
Growth rate of phishing sites
 Number of URLs 1,75,229
 Significant growth caused by huge number of phishing
websites created by criminals for financial benefits
 Phishing techniques are improved regularly & getting more
sophisticated
Approaches of Antiphishing
Antiphishing approaches are developed to combat the
problem of phishing
The existing approaches are
Feature based
Content based
URL blacklist based
Objectives of approach
 Identify & extract phishing features based on five
inputs
 Develop a neuro fuzzy model
 Train & validate the fuzzy inference model on real time
 Maximizing the accuracy of performance and minimizing
false positive & operation time
Methodology
Proposed approach utilize Neuro Fuzzy with five inputs
 Neuro fuzzy
 Five inputs
Neuro Fuzzy
 Combination of fuzzy logic & neural network
Neuro fuzzy = Fuzzy logic + Neural network
 Allows use of numeric & linguistic properties
 Allows Universal approximation with ability to use fuzzy
IF......Then rules
 Fuzzy logic deal with reasoning on higher level using
numerical and linguistic information from domain
expert
 Neural network perform well when dealing with raw
data
Five Inputs
 Five inputs are five tables where features are extracted and
stored for references
 Wholly representative of phishing attack technique and
strategies
 288 features are extracted from these inputs
i. Legitimate site rules
ii. User behavioral profile
iii. Phish tank
iv. User specific sites
v. Pop up from email
Five Inputs
 Legitimate site rules
Summary of law covering phishing crime
 User behavioral profile
List of people behavior when interacting with phishing
websites
 Phish tank
Free community website where suspected websites are
verified and voted as a phish by community experts
Five Inputs
 User specific sites
Contains binding information between user and online
transaction service provider
 Pop-Ups from Email
Pop-Ups from email are general phrases used by
phishers
Feature Extraction And
Analysis
 Extraction is based on the five inputs
 An automated wizard is used to extract features and store
in excel sheet as phishing techniques evolve with time
 Legitimate site rules consist of 66 extracted features
 Based on user behavior profile 60 features are extracted
 Likewise phish tank carries 72 features that are extracted by
exploring 200 phishing websites from phish tank archive
Feature Extraction And
Analysis
 Also user specific sites have 48 features extracted by
consulting with bank experts & 20 legal websites
 Equally pop-ups from email consist of 42 features gathered
by observing pop-ups on screen
 These total 288 feature also known as data
 This data is used to differentiate between phishing
,legitimate and suspicious websites accurately
 Most frequent terms are searched by using ‘FIND’
function
Feature Extraction And
Analysis
 Consequently the terms that appear often are assigned
a value from 0 to 1 that is
phishing website= 1
Legitimate website= 0
Suspicious website = Any number between 0 to 1
 This strategy facilitate accuracy & reduces
complexity in fuzzy rules
Figure: Intelligent phishing detection system overall process diagram
Experimental Procedure
Training and testing methods
 2 fold cross validation method is used to train and test the
accuracy and robustness of the proposed model
 Divides data into two parts
i. Training is done on part I
ii. Testing is done on part II
 Then the role of training and testing is reversed
 Finally the results are assembled
Conclusion And Future Work
 Study presented is based on neural fuzzy scheme to
detect phishing websites & protect customers
performing online transactions on those sites
 Using 2 fold cross validation the proposed scheme with
five input offer a high accuracy in detecting phishing
sites in real time
 Scheme offers better performance in comparison to
previously reported research
 Primary contribution of this research is the framework
of five input which are the most important elements of
this research
Continue….
 Future work is adding more feature & parameters
optimization for a 100% accuracy to develop a plug in
toolbar for real time application
References
1. Intelligent phishing detection and protection scheme for online transacti
Original Research Article
Expert Systems with Applications, Volume 40, Issue 11, 1 September
2013, Pages 4697-4706
P.A. Barraclough, M.A. Hossain, M.A. Tahir, G. Sexton, N. Aslam
2.
Intelligent phishing detection system for e-banking using fuzzy data mini
Original Research Article
Expert Systems with Applications, Volume 37, Issue 12, December
2010, Pages 7913-7921
Maher Aburrous, M.A. Hossain, Keshav Dahal, Fadi Thabtah
Any Questions??Any Questions??
ThankThank
You...You...

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Detection of Phishing Websites
Detection of Phishing Websites Detection of Phishing Websites
Detection of Phishing Websites
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 

Destacado

Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
Mudit Dholakia
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Destacado (7)

Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
 
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
 
Introduction to .NET Programming
Introduction to .NET ProgrammingIntroduction to .NET Programming
Introduction to .NET Programming
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Architecture of .net framework
Architecture of .net frameworkArchitecture of .net framework
Architecture of .net framework
 

Similar a Phishing detection & protection scheme

A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
bhas_ani
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
vivatechijri
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
rakhicse
 
PHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINKPHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINK
RajeshRavi44
 

Similar a Phishing detection & protection scheme (20)

[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
phishing in computer science engineering.pptx
phishing in  computer science engineering.pptxphishing in  computer science engineering.pptx
phishing in computer science engineering.pptx
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
PHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINKPHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINK
 
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostPhishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Phishing detection & protection scheme

  • 1. Presented By: Shaikh Mussavir Ahemad SGGS IE &T, Nanded Intelligent Phishing detection & protection scheme for online Transaction
  • 2. Outline  Introduction  Methodology  Feature extraction & analysis  Experimental procedures  Conclusions & future work  References  Questions
  • 3. Introduction  What is phishing ?  Phishing basics  Phishing information flow  Visually similar Webpages  Growth rate of phishing sites  Approaches of anti phishing  Objectives of Study
  • 4. What is Phishing? Definition  Phishing is an act to fraudulently acquire user’s sensitive information such as password, credit/debit card number through illegal website that look exactly like target website
  • 5. Phishing basics  Visually similar website  Email containing time constraint  Fake https certificate  Attractive offers one phishing webpage  Attractive games containing link to the phishing webpage
  • 8. Growth rate of phishing sites According to UK cards association press release report:  Phishing attacks caused $21.6 million loss between January & June 2012  A growth of 28% from June 2011  Number of websites detected by APWG 63,253 /month
  • 9. Growth rate of phishing sites  Number of URLs 1,75,229  Significant growth caused by huge number of phishing websites created by criminals for financial benefits  Phishing techniques are improved regularly & getting more sophisticated
  • 10. Approaches of Antiphishing Antiphishing approaches are developed to combat the problem of phishing The existing approaches are Feature based Content based URL blacklist based
  • 11. Objectives of approach  Identify & extract phishing features based on five inputs  Develop a neuro fuzzy model  Train & validate the fuzzy inference model on real time  Maximizing the accuracy of performance and minimizing false positive & operation time
  • 12. Methodology Proposed approach utilize Neuro Fuzzy with five inputs  Neuro fuzzy  Five inputs
  • 13. Neuro Fuzzy  Combination of fuzzy logic & neural network Neuro fuzzy = Fuzzy logic + Neural network  Allows use of numeric & linguistic properties  Allows Universal approximation with ability to use fuzzy IF......Then rules  Fuzzy logic deal with reasoning on higher level using numerical and linguistic information from domain expert  Neural network perform well when dealing with raw data
  • 14. Five Inputs  Five inputs are five tables where features are extracted and stored for references  Wholly representative of phishing attack technique and strategies  288 features are extracted from these inputs i. Legitimate site rules ii. User behavioral profile iii. Phish tank iv. User specific sites v. Pop up from email
  • 15. Five Inputs  Legitimate site rules Summary of law covering phishing crime  User behavioral profile List of people behavior when interacting with phishing websites  Phish tank Free community website where suspected websites are verified and voted as a phish by community experts
  • 16. Five Inputs  User specific sites Contains binding information between user and online transaction service provider  Pop-Ups from Email Pop-Ups from email are general phrases used by phishers
  • 17. Feature Extraction And Analysis  Extraction is based on the five inputs  An automated wizard is used to extract features and store in excel sheet as phishing techniques evolve with time  Legitimate site rules consist of 66 extracted features  Based on user behavior profile 60 features are extracted  Likewise phish tank carries 72 features that are extracted by exploring 200 phishing websites from phish tank archive
  • 18. Feature Extraction And Analysis  Also user specific sites have 48 features extracted by consulting with bank experts & 20 legal websites  Equally pop-ups from email consist of 42 features gathered by observing pop-ups on screen  These total 288 feature also known as data  This data is used to differentiate between phishing ,legitimate and suspicious websites accurately  Most frequent terms are searched by using ‘FIND’ function
  • 19. Feature Extraction And Analysis  Consequently the terms that appear often are assigned a value from 0 to 1 that is phishing website= 1 Legitimate website= 0 Suspicious website = Any number between 0 to 1  This strategy facilitate accuracy & reduces complexity in fuzzy rules
  • 20. Figure: Intelligent phishing detection system overall process diagram
  • 21. Experimental Procedure Training and testing methods  2 fold cross validation method is used to train and test the accuracy and robustness of the proposed model  Divides data into two parts i. Training is done on part I ii. Testing is done on part II  Then the role of training and testing is reversed  Finally the results are assembled
  • 22. Conclusion And Future Work  Study presented is based on neural fuzzy scheme to detect phishing websites & protect customers performing online transactions on those sites  Using 2 fold cross validation the proposed scheme with five input offer a high accuracy in detecting phishing sites in real time  Scheme offers better performance in comparison to previously reported research  Primary contribution of this research is the framework of five input which are the most important elements of this research
  • 23. Continue….  Future work is adding more feature & parameters optimization for a 100% accuracy to develop a plug in toolbar for real time application
  • 24. References 1. Intelligent phishing detection and protection scheme for online transacti Original Research Article Expert Systems with Applications, Volume 40, Issue 11, 1 September 2013, Pages 4697-4706 P.A. Barraclough, M.A. Hossain, M.A. Tahir, G. Sexton, N. Aslam 2. Intelligent phishing detection system for e-banking using fuzzy data mini Original Research Article Expert Systems with Applications, Volume 37, Issue 12, December 2010, Pages 7913-7921 Maher Aburrous, M.A. Hossain, Keshav Dahal, Fadi Thabtah