ARCHIVES

Research Article

An Investigation of AI-Enabled Comprehensive Survey of Phishing Attacks detection techniques

Sivakumar Nagarajan1

Technical Architect, I & I Software Inc, ²⁵⁷¹ Baglyos Circle, Suite B-³², Bethlehem, PA-¹⁸⁰²⁰, USA.

Published Online: January-February 2024

Pages: 55-59

Abstract

View PDF

Phishing is an online criminal activity which traps regular online customers to reveal their sensitive information into fake destinations by disguising themselves as original website. Because of the short life expectancy of phishing sites and the fast progression of phishing systems the current anti- phishing solutions are either unfit to manage the rising changes or in fit for assuming a successful part against this attack.Natural language handling and machine learning – these are the centre usage of the multi-stage approach proposed to identify phishing attacks and to perceive the substance/association that has been misused by the attackers to execute the phishing attacks. In this technique the primary stage is the revelation of named elements (names of areas, individuals and associations) and afterward the disclosure of concealed topics and for this the strategies that backings both phishing and non-phishing information therefore, Conditional Random Field (CRF) and Latent Dirichlet Allocation (LDA) is utilized. Next stage is the AdaBoost arrange where the named elements and the concealed subjects are dealt as features and the messages are ordered into phishing or non-phishing. proposed techniques are planned to alleviate the effect of phishing attack. The principal strategy proposes is to identify Wi-Fi phishing utilizing Association Rule mining. A Wi-Fi hotspot which associates such hand held gadgets has turned into a transitory archive of delicate data, in this way giving an open door for programmers to gather money related gain .Consequently data security arrangements tending to Wi-Fi hotspots (Wi-Fi phishing attack) has turned into the need of great importance. The conceivable approaches to attack the security of Wi-Fi hotspots and counter-attack methodologies have been tended to in this strategy.

Related Articles

2024

Embedding Artificial Intelligence for Personal Voice Assistant Using NLP

2024

Analysis of Pedestrian Steel Bridge subjected the Seismic Load and Wind Load using Damper at different Span

2024

Review Paper on Comparison of Asymmetric and Symmetric RCC Building with Soil Structure Interaction by Dynamic Loading

2024

BLYNK RFID and Retinal Lock Access System

2024

ML-Driven Facial Synthesis from Spoken Words Using Conditional GANs

2024

Research on smart baby cradle using sensor technology

2024

Multimodal Biometric Login System Using Face and Signature

2024

Optimization of Geometrical Characteristics of Building by Using Diagrid System against Lateral Forces

2024

PDF-Chat SaaS Platform Using MERN Stack

2024

Social Media App for Connecting Similar Interests People Using flutter

An Investigation of AI-Enabled Comprehensive Survey of Phishing Attacks detection techniques | IJIRE