SlideShare a Scribd company logo
1 of 26
Presented By:
Shaikh Mussavir Ahemad
SGGS IE &T, Nanded
Intelligent Phishing detection &
protection scheme for online
Transaction
Outline
 Introduction
 Methodology
 Feature extraction & analysis
 Experimental procedures
 Conclusions & future work
 References
 Questions
Introduction
 What is phishing ?
 Phishing basics
 Phishing information flow
 Visually similar Webpages
 Growth rate of phishing sites
 Approaches of anti phishing
 Objectives of Study
What is Phishing?
Definition
 Phishing is an act to fraudulently acquire user’s sensitive
information such as password, credit/debit card number
through illegal website that look exactly like target website
Phishing basics
 Visually similar website
 Email containing time constraint
 Fake https certificate
 Attractive offers one phishing webpage
 Attractive games containing link to the phishing webpage
Figure:Phishing information flow
Visually similar websites
Growth rate of phishing sites
According to UK cards association press release report:
 Phishing attacks caused $21.6 million loss between January
& June 2012
 A growth of 28% from June 2011
 Number of websites detected by APWG 63,253 /month
Growth rate of phishing sites
 Number of URLs 1,75,229
 Significant growth caused by huge number of phishing
websites created by criminals for financial benefits
 Phishing techniques are improved regularly & getting more
sophisticated
Approaches of Antiphishing
Antiphishing approaches are developed to combat the
problem of phishing
The existing approaches are
Feature based
Content based
URL blacklist based
Objectives of approach
 Identify & extract phishing features based on five
inputs
 Develop a neuro fuzzy model
 Train & validate the fuzzy inference model on real time
 Maximizing the accuracy of performance and minimizing
false positive & operation time
Methodology
Proposed approach utilize Neuro Fuzzy with five inputs
 Neuro fuzzy
 Five inputs
Neuro Fuzzy
 Combination of fuzzy logic & neural network
Neuro fuzzy = Fuzzy logic + Neural network
 Allows use of numeric & linguistic properties
 Allows Universal approximation with ability to use fuzzy
IF......Then rules
 Fuzzy logic deal with reasoning on higher level using
numerical and linguistic information from domain
expert
 Neural network perform well when dealing with raw
data
Five Inputs
 Five inputs are five tables where features are extracted and
stored for references
 Wholly representative of phishing attack technique and
strategies
 288 features are extracted from these inputs
i. Legitimate site rules
ii. User behavioral profile
iii. Phish tank
iv. User specific sites
v. Pop up from email
Five Inputs
 Legitimate site rules
Summary of law covering phishing crime
 User behavioral profile
List of people behavior when interacting with phishing
websites
 Phish tank
Free community website where suspected websites are
verified and voted as a phish by community experts
Five Inputs
 User specific sites
Contains binding information between user and online
transaction service provider
 Pop-Ups from Email
Pop-Ups from email are general phrases used by
phishers
Feature Extraction And
Analysis
 Extraction is based on the five inputs
 An automated wizard is used to extract features and store
in excel sheet as phishing techniques evolve with time
 Legitimate site rules consist of 66 extracted features
 Based on user behavior profile 60 features are extracted
 Likewise phish tank carries 72 features that are extracted by
exploring 200 phishing websites from phish tank archive
Feature Extraction And
Analysis
 Also user specific sites have 48 features extracted by
consulting with bank experts & 20 legal websites
 Equally pop-ups from email consist of 42 features gathered
by observing pop-ups on screen
 These total 288 feature also known as data
 This data is used to differentiate between phishing
,legitimate and suspicious websites accurately
 Most frequent terms are searched by using ‘FIND’
function
Feature Extraction And
Analysis
 Consequently the terms that appear often are assigned
a value from 0 to 1 that is
phishing website= 1
Legitimate website= 0
Suspicious website = Any number between 0 to 1
 This strategy facilitate accuracy & reduces
complexity in fuzzy rules
Figure: Intelligent phishing detection system overall process diagram
Experimental Procedure
Training and testing methods
 2 fold cross validation method is used to train and test the
accuracy and robustness of the proposed model
 Divides data into two parts
i. Training is done on part I
ii. Testing is done on part II
 Then the role of training and testing is reversed
 Finally the results are assembled
Conclusion And Future Work
 Study presented is based on neural fuzzy scheme to
detect phishing websites & protect customers
performing online transactions on those sites
 Using 2 fold cross validation the proposed scheme with
five input offer a high accuracy in detecting phishing
sites in real time
 Scheme offers better performance in comparison to
previously reported research
 Primary contribution of this research is the framework
of five input which are the most important elements of
this research
Continue….
 Future work is adding more feature & parameters
optimization for a 100% accuracy to develop a plug in
toolbar for real time application
References
1. Intelligent phishing detection and protection scheme for online transacti
Original Research Article
Expert Systems with Applications, Volume 40, Issue 11, 1 September
2013, Pages 4697-4706
P.A. Barraclough, M.A. Hossain, M.A. Tahir, G. Sexton, N. Aslam
2.
Intelligent phishing detection system for e-banking using fuzzy data mini
Original Research Article
Expert Systems with Applications, Volume 37, Issue 12, December
2010, Pages 7913-7921
Maher Aburrous, M.A. Hossain, Keshav Dahal, Fadi Thabtah
Any Questions??Any Questions??
ThankThank
You...You...

More Related Content

What's hot

A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
vivatechijri
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 

What's hot (20)

CSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVCCSRF Attack and Its Prevention technique in ASP.NET MVC
CSRF Attack and Its Prevention technique in ASP.NET MVC
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
Xss attack
Xss attackXss attack
Xss attack
 
Phishing
PhishingPhishing
Phishing
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge AheadPhishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge Ahead
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Phishing
PhishingPhishing
Phishing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 

Viewers also liked

Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
Mudit Dholakia
 

Viewers also liked (6)

Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
 
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
 
Introduction to .NET Programming
Introduction to .NET ProgrammingIntroduction to .NET Programming
Introduction to .NET Programming
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Architecture of .net framework
Architecture of .net frameworkArchitecture of .net framework
Architecture of .net framework
 

Similar to Phishing detection & protection scheme

A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
bhas_ani
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
rakhicse
 
PHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINKPHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINK
RajeshRavi44
 

Similar to Phishing detection & protection scheme (20)

[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
phishing in computer science engineering.pptx
phishing in  computer science engineering.pptxphishing in  computer science engineering.pptx
phishing in computer science engineering.pptx
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
PHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINKPHISHING URL DETECTION AND MALICIOUS LINK
PHISHING URL DETECTION AND MALICIOUS LINK
 
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostPhishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
 
IJSRED-V2I4P0
IJSRED-V2I4P0IJSRED-V2I4P0
IJSRED-V2I4P0
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

Phishing detection & protection scheme

  • 1. Presented By: Shaikh Mussavir Ahemad SGGS IE &T, Nanded Intelligent Phishing detection & protection scheme for online Transaction
  • 2. Outline  Introduction  Methodology  Feature extraction & analysis  Experimental procedures  Conclusions & future work  References  Questions
  • 3. Introduction  What is phishing ?  Phishing basics  Phishing information flow  Visually similar Webpages  Growth rate of phishing sites  Approaches of anti phishing  Objectives of Study
  • 4. What is Phishing? Definition  Phishing is an act to fraudulently acquire user’s sensitive information such as password, credit/debit card number through illegal website that look exactly like target website
  • 5. Phishing basics  Visually similar website  Email containing time constraint  Fake https certificate  Attractive offers one phishing webpage  Attractive games containing link to the phishing webpage
  • 8. Growth rate of phishing sites According to UK cards association press release report:  Phishing attacks caused $21.6 million loss between January & June 2012  A growth of 28% from June 2011  Number of websites detected by APWG 63,253 /month
  • 9. Growth rate of phishing sites  Number of URLs 1,75,229  Significant growth caused by huge number of phishing websites created by criminals for financial benefits  Phishing techniques are improved regularly & getting more sophisticated
  • 10. Approaches of Antiphishing Antiphishing approaches are developed to combat the problem of phishing The existing approaches are Feature based Content based URL blacklist based
  • 11. Objectives of approach  Identify & extract phishing features based on five inputs  Develop a neuro fuzzy model  Train & validate the fuzzy inference model on real time  Maximizing the accuracy of performance and minimizing false positive & operation time
  • 12. Methodology Proposed approach utilize Neuro Fuzzy with five inputs  Neuro fuzzy  Five inputs
  • 13. Neuro Fuzzy  Combination of fuzzy logic & neural network Neuro fuzzy = Fuzzy logic + Neural network  Allows use of numeric & linguistic properties  Allows Universal approximation with ability to use fuzzy IF......Then rules  Fuzzy logic deal with reasoning on higher level using numerical and linguistic information from domain expert  Neural network perform well when dealing with raw data
  • 14. Five Inputs  Five inputs are five tables where features are extracted and stored for references  Wholly representative of phishing attack technique and strategies  288 features are extracted from these inputs i. Legitimate site rules ii. User behavioral profile iii. Phish tank iv. User specific sites v. Pop up from email
  • 15. Five Inputs  Legitimate site rules Summary of law covering phishing crime  User behavioral profile List of people behavior when interacting with phishing websites  Phish tank Free community website where suspected websites are verified and voted as a phish by community experts
  • 16. Five Inputs  User specific sites Contains binding information between user and online transaction service provider  Pop-Ups from Email Pop-Ups from email are general phrases used by phishers
  • 17. Feature Extraction And Analysis  Extraction is based on the five inputs  An automated wizard is used to extract features and store in excel sheet as phishing techniques evolve with time  Legitimate site rules consist of 66 extracted features  Based on user behavior profile 60 features are extracted  Likewise phish tank carries 72 features that are extracted by exploring 200 phishing websites from phish tank archive
  • 18. Feature Extraction And Analysis  Also user specific sites have 48 features extracted by consulting with bank experts & 20 legal websites  Equally pop-ups from email consist of 42 features gathered by observing pop-ups on screen  These total 288 feature also known as data  This data is used to differentiate between phishing ,legitimate and suspicious websites accurately  Most frequent terms are searched by using ‘FIND’ function
  • 19. Feature Extraction And Analysis  Consequently the terms that appear often are assigned a value from 0 to 1 that is phishing website= 1 Legitimate website= 0 Suspicious website = Any number between 0 to 1  This strategy facilitate accuracy & reduces complexity in fuzzy rules
  • 20. Figure: Intelligent phishing detection system overall process diagram
  • 21. Experimental Procedure Training and testing methods  2 fold cross validation method is used to train and test the accuracy and robustness of the proposed model  Divides data into two parts i. Training is done on part I ii. Testing is done on part II  Then the role of training and testing is reversed  Finally the results are assembled
  • 22. Conclusion And Future Work  Study presented is based on neural fuzzy scheme to detect phishing websites & protect customers performing online transactions on those sites  Using 2 fold cross validation the proposed scheme with five input offer a high accuracy in detecting phishing sites in real time  Scheme offers better performance in comparison to previously reported research  Primary contribution of this research is the framework of five input which are the most important elements of this research
  • 23. Continue….  Future work is adding more feature & parameters optimization for a 100% accuracy to develop a plug in toolbar for real time application
  • 24. References 1. Intelligent phishing detection and protection scheme for online transacti Original Research Article Expert Systems with Applications, Volume 40, Issue 11, 1 September 2013, Pages 4697-4706 P.A. Barraclough, M.A. Hossain, M.A. Tahir, G. Sexton, N. Aslam 2. Intelligent phishing detection system for e-banking using fuzzy data mini Original Research Article Expert Systems with Applications, Volume 37, Issue 12, December 2010, Pages 7913-7921 Maher Aburrous, M.A. Hossain, Keshav Dahal, Fadi Thabtah