Journal article Open Access

A Phishing URL Classification Technique using Machine Learning Approach

Manish Tiwari; Dr. Tripti Arjariya

Citation Style Language JSON Export

  "DOI": "10.35940/ijitee.C8338.0110321", 
  "container_title": "International Journal of Innovative Technology and Exploring Engineering (IJITEE)", 
  "language": "eng", 
  "title": "A Phishing URL Classification Technique using  Machine Learning Approach", 
  "issued": {
    "date-parts": [
  "abstract": "<p>The phishing attack is one of the very common attacks deployed using the social engineering techniques. The attack tries to capture the victim&rsquo;s personal and sensitive information to trick and can results in terms of financial and social reputation loss. In this presented work the main focus is to investigate the phishing techniques and their detection approaches. In this context first a review on recently contributed URL based phishing attack detection and prevision techniques is prepared. Further based on the suitable techniques a new data mining based model is proposed for implementation. The proposed model first take training on phish tank database URLs and then identify the similar pattern based URLs in two classes legitimate and phishing. First the dataset is preprocessed and the features are computed. The computed features are then transformed in terms of transactional database and association rules are prepared. To generate the association rules the apriori algorithm and FP-Tree algorithm is employed. Based on conducted experiments, the performance the FP-Tree based classification technique much efficient and accurate as compared to apriori algorithm, because the apriori algorithm is much time expensive then the FP-Tree. Finally the future extension of the work is also suggested.</p>", 
  "author": [
      "family": "Manish Tiwari"
      "family": "Dr. Tripti Arjariya"
  "page": "73-79", 
  "volume": "10", 
  "type": "article-journal", 
  "issue": "3", 
  "id": "5833442"
Views 35
Downloads 14
Data volume 10.9 MB
Unique views 28
Unique downloads 14


Cite as