Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li...
详细信息
ISBN:
(纸本)9798350367904
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical limitations in dealing with evolving tactics and new phishing schemes. Some of these approaches fail to cope with the temporal and visual patterns of phishing sites, which are crucial for timely and accurate detection. To overcome these difficulties, this work introduces a hybrid AI-based phishing website detection model that utilizes several machine learning and deep learning techniques to improve the accuracy of the detection and remove false positives. The proposed model uses LSTM networks, Genetic Algorithms, Random Forest, and CNN through the stacking ensemble framework. Since LSTM is adopted to capture the temporal dependencies in the website traffic and user interaction patterns, this model can effectively model their phishing behavior over time. GA is used for bioinspired feature selection to reduce the dimensionality of features while optimizing model performance. Random Forest is used as a base layer addressing structured features like URL characteristics and WHOIS information. CNNs are incorporated to extract feature content from a webpage and images that carry various visual indicators often used in phishing attacks including counterfeit logos or banners. A meta-classifier is then used to combine the outputs of LSTMs, CNN, and RF and generate the final classification to boost the detection rate. The proposed hybrid model surpasses the existing techniques and facilitates the analysis of temporal, visual, and structured data, making the detection considerably more accurate. Achieving accuracy of as much as 96-97% and having an AUC of 0.97 with a false positive rate below 3%, the model then impacts the more powerful and more flexible phishing detection system, which is then capable of being more protective against higher sophisticated phishing te
The growth of automation in the industry makes securing IoT networks a critical priority. A resilient network intrusion detection system (NIDS) can reduce cyber threats. Detecting network traffic irregularities with d...
详细信息
The challenges stemming from crop diseases and a limited grasp of optimal fertilization practices have significantly burdened farmers, leading to reduced crop yields and a ripple effect of interconnected issues. This ...
详细信息
This paper introduces an innovative model-driven approach for seamlessly integrating control logic into the building planning phase, ensuring consistency throughout deployment. Leveraging an open building information ...
详细信息
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip...
详细信息
ISBN:
(纸本)9798350328202
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to principally uphold the confirmation framework. Notwithstanding foundations regulating guaranteed about information straightforwardly, affiliations are also obliging them to examine the fingerprint endorsement. Despite establishments overseeing ensured about data, directly associations are similarly obliging them to research the fingerprint check. Organizations and foundations both are typically utilizing the idea of fingerprint for the participation and presence reason. Nevertheless, establishments presently managing secured information as like institutes and additionally going along with them to investigate the fingerprint authentication. More than this usual action there are some particular applications where the authentication would be considerable to help the application than using a traditional pattern of password. We proposed a fingerprint authentication system for the scientific based industry database access system. We removed the noise if any found in the input fingerprint using anisotropic Gauss filtering. The noise free fingerprint image is not further passed to the binarization phase as the need of binarization and some form of the drawback of binarization is replaced with a thinning algorithm. The thinned fingerprint image is followed by the matching process and once it is matched, then only the sensitive and highly confidential information are allowed to access from the database. The testing is done using OpenCV and FVC 2004 dataset to assess the projected retrieval method. Further the matched fingerprints are used to prove some of the internal structure properties of multi-granular rough sets (MGRS) on authenticated database fields. The accuracy obtained in this hybrid approach is found to be more satisfactory and hence the security towards acce
In semiconductor processing to form surface shapes, photolithography and dry etching are used. In this case, the vacuum process requires improvements cost and productivity. We propose a sonic-Assisted processing metho...
详细信息
Nowadays, the widespread internet technology brings out rapid advancement in the use of videos for sharing huge amounts of secret data. Conversely, the privacy of transmitted digital content is jeopardized by digital ...
详细信息
Facial Attendance Tracker is a mobile application where a student can fetch his/her attendance by scanning his/her face from his/her own mobile. The faculty will project the Dynamic QR code when he/she wants to take t...
详细信息
A method for reconstructing the effective electron collision frequency has been developed, based on data on the amplitudes of radio signals obtained during low-angle ionospheric sounding. Ray trajectories and wave vec...
详细信息
Phaseless imaging is a prominent field of study in many imaging modalities. In practical applications, the phaseless measurements usually contain noise and outliers, limiting the reconstruction algorithms' perform...
详细信息
暂无评论