ARCHIVES
An Investigation of AI-Enabled Comprehensive Survey of Phishing Attacks detection techniques
Technical Architect, I & I Software Inc, ²⁵⁷¹ Baglyos Circle, Suite B-³², Bethlehem, PA-¹⁸⁰²⁰, USA.
Published Online: January-February 2024
Pages: 55-59
Cite this article
↗ https://www.doi.org/10.59256/ijire.20240501001Abstract
View PDFPhishing is an online criminal activity which traps regular online customers to reveal their sensitive information into fake destinations by disguising themselves as original website. Because of the short life expectancy of phishing sites and the fast progression of phishing systems the current anti- phishing solutions are either unfit to manage the rising changes or in fit for assuming a successful part against this attack.Natural language handling and machine learning – these are the centre usage of the multi-stage approach proposed to identify phishing attacks and to perceive the substance/association that has been misused by the attackers to execute the phishing attacks. In this technique the primary stage is the revelation of named elements (names of areas, individuals and associations) and afterward the disclosure of concealed topics and for this the strategies that backings both phishing and non-phishing information therefore, Conditional Random Field (CRF) and Latent Dirichlet Allocation (LDA) is utilized. Next stage is the AdaBoost arrange where the named elements and the concealed subjects are dealt as features and the messages are ordered into phishing or non-phishing. proposed techniques are planned to alleviate the effect of phishing attack. The principal strategy proposes is to identify Wi-Fi phishing utilizing Association Rule mining. A Wi-Fi hotspot which associates such hand held gadgets has turned into a transitory archive of delicate data, in this way giving an open door for programmers to gather money related gain .Consequently data security arrangements tending to Wi-Fi hotspots (Wi-Fi phishing attack) has turned into the need of great importance. The conceivable approaches to attack the security of Wi-Fi hotspots and counter-attack methodologies have been tended to in this strategy.
Related Articles
2024
Embedding Artificial Intelligence for Personal Voice Assistant Using NLP
2024
Analysis of Pedestrian Steel Bridge subjected the Seismic Load and Wind Load using Damper at different Span
2024
Review Paper on Comparison of Asymmetric and Symmetric RCC Building with Soil Structure Interaction by Dynamic Loading
2024
BLYNK RFID and Retinal Lock Access System
2024
ML-Driven Facial Synthesis from Spoken Words Using Conditional GANs
2024
Research on smart baby cradle using sensor technology
2024
Multimodal Biometric Login System Using Face and Signature
2024
Optimization of Geometrical Characteristics of Building by Using Diagrid System against Lateral Forces
2024
PDF-Chat SaaS Platform Using MERN Stack
2024
Social Media App for Connecting Similar Interests People Using flutter


