Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li...
详细信息
ISBN:
(纸本)9798350367904
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical limitations in dealing with evolving tactics and new phishing schemes. Some of these approaches fail to cope with the temporal and visual patterns of phishing sites, which are crucial for timely and accurate detection. To overcome these difficulties, this work introduces a hybrid AI-based phishing website detection model that utilizes several machine learning and deep learning techniques to improve the accuracy of the detection and remove false positives. The proposed model uses LSTM networks, Genetic Algorithms, Random Forest, and CNN through the stacking ensemble framework. Since LSTM is adopted to capture the temporal dependencies in the website traffic and user interaction patterns, this model can effectively model their phishing behavior over time. GA is used for bioinspired feature selection to reduce the dimensionality of features while optimizing model performance. Random Forest is used as a base layer addressing structured features like URL characteristics and WHOIS information. CNNs are incorporated to extract feature content from a webpage and images that carry various visual indicators often used in phishing attacks including counterfeit logos or banners. A meta-classifier is then used to combine the outputs of LSTMs, CNN, and RF and generate the final classification to boost the detection rate. The proposed hybrid model surpasses the existing techniques and facilitates the analysis of temporal, visual, and structured data, making the detection considerably more accurate. Achieving accuracy of as much as 96-97% and having an AUC of 0.97 with a false positive rate below 3%, the model then impacts the more powerful and more flexible phishing detection system, which is then capable of being more protective against higher sophisticated phishing te
In human perceptive, Augmented Reality (AR) or Virtual Reality(VR) is an effective and deep technology because it creates new replicated world. The AR or VR technique is a distinctive and lucrative application;its imm...
详细信息
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi...
详细信息
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ...
详细信息
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge for malicious traffic *** have extensive studies on malicious traffic detection with single challenge,but the detection of complex traffic has not been widely *** adaptive random forests(QARF) is proposed to detect traffic streams with concept drift,imbalance and lack of labeled *** is an online active learning based approach which combines adaptive random forests method and adaptive margin sampling *** achieves querying a small number of instances from unlabeled traffic streams to obtain effective *** conduct experiments using the NSL-KDD dataset to evaluate the performance of *** is compared with other state-of-the-art *** experimental results show that QARF obtains 98.20% accuracy on the NSL-KDD *** performs better than other state-of-the-art methods in comparisons.
Deep learning and transfer learning are extremely important in the internet sector and the health care industry. Face recognition technology is essential in practically every industry in our digital age. Several impro...
详细信息
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip...
详细信息
ISBN:
(纸本)9798350328202
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to principally uphold the confirmation framework. Notwithstanding foundations regulating guaranteed about information straightforwardly, affiliations are also obliging them to examine the fingerprint endorsement. Despite establishments overseeing ensured about data, directly associations are similarly obliging them to research the fingerprint check. Organizations and foundations both are typically utilizing the idea of fingerprint for the participation and presence reason. Nevertheless, establishments presently managing secured information as like institutes and additionally going along with them to investigate the fingerprint authentication. More than this usual action there are some particular applications where the authentication would be considerable to help the application than using a traditional pattern of password. We proposed a fingerprint authentication system for the scientific based industry database access system. We removed the noise if any found in the input fingerprint using anisotropic Gauss filtering. The noise free fingerprint image is not further passed to the binarization phase as the need of binarization and some form of the drawback of binarization is replaced with a thinning algorithm. The thinned fingerprint image is followed by the matching process and once it is matched, then only the sensitive and highly confidential information are allowed to access from the database. The testing is done using OpenCV and FVC 2004 dataset to assess the projected retrieval method. Further the matched fingerprints are used to prove some of the internal structure properties of multi-granular rough sets (MGRS) on authenticated database fields. The accuracy obtained in this hybrid approach is found to be more satisfactory and hence the security towards acce
The challenges stemming from crop diseases and a limited grasp of optimal fertilization practices have significantly burdened farmers, leading to reduced crop yields and a ripple effect of interconnected issues. This ...
详细信息
Billions of people worldwide are affected by vision impairment majorly caused due to age-related degradation and refractive errors. Diabetic Retinopathy(DR) and Macular Hole(MH) are among the most prevalent senescent ...
详细信息
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul...
详细信息
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin...
详细信息
暂无评论