logo

Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques

   

Added on  2022-08-18

4 Pages574 Words17 Views
Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques
Student’s name
Institution Affiliation(s)
Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques_1
Explain the principle contribution of the paper or the subject discussed in it (if any).
The principle contribution of the paper is mobile phishing websites. The paper describes
phishing as the process of trying to steal user data over the internet by posing as trusted entities
and thus gaining illegal or unauthorized access to victim’s user data such as usernames,
passwords, and credit card credentials (Kadhim, Al-saedi, & Al-Hassani, 2019).
Explain the technique presented in the paper (if any).
The paper describes several methods that are used for the detection of phishing, for
instance, heuristic methods, the blacklist techniques, and the visual appearance techniques. The
blacklist techniques checks websites in a list of all the websites that have been blacklisted.
Firstly, the blacklist method is advantageous and effective as it detects blacklisted sites
very fast. On the downside, the technique is not able to detect websites that appear only for a few
hours, a day, or “zero-day phishing attack”(Kadhim et al., 2019).
Secondly, the heuristic method depends on the characteristics extracted from HTML,
URL, and Search Engine, together with the data mining methods that are applied in determining
the status of the site. Thus, this method is preferable to blacklist techniques as it addresses the
zero-day phishing attacks (Goel & Jain, 2018).
Lastly, the visual appearance technique is dependent on the similarity between sites in the
detection of phishing. When the visual features of the suspected site match with the legit website,
the method checks if the URL is in the authentic domain URLs list. If it’s not found in the list,
then it is marked as a phishing website(Kadhim et al., 2019).
If there is an experiment, explain the setup first so that the obtained results can be better
appreciated.
Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques_2

End of preview

Want to access all the pages? Upload your documents or become a member.