Employing Machine Learning Strategies to Pinpoint Fraudulent Web Pages
Shivakumar G1, Sandarsh Gowda M M2
1 Student, Department of MCA, Bangalore Institute of Technology, Karnataka, India
2Associate Professor, Department of MCA, Bangalore Institute of Technology, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Criminals create illicit clones of real websites and email accounts in an attempt to obtain critical information. The email will only contain actual company slogans and logos. The hackers obtain access to all of the user's personal data, including photos, bank account details, and login passwords, when the victim clicks on a link they have supplied. The accuracy of the Random Forest and Decision Tree algorithms, which are widely used in current systems, has to be improved. The latency of the current models is minimal. Current systems lack a dedicated user interface. Different algorithms are not compared in the current system. When customers click on the links or open the emails, they are taken to a spoof website that looks to be from the real business. The models are used to identify and apply the best machine learning model, as well as to identify phishing websites based on URL importance factors. The machine learning techniques that are contrasted include XG Boost, Multinomial Naive Bayes, and Logistic Regression. The two algorithms are outperformed by the Logistic Regression algorithm. Phishing is a common technique that uses phony websites to fool credulous people into divulging their personal information. The purpose of phishing website URLs is to obtain personal information such as passwords, user names, and online banking activity. Phishers use websites that are grammatically and aesthetically similar to those authentic ones. The rapid progress of phishing strategies due to technological advancements must be stopped by employing anti-phishing tools to detect phishing. Machine learning is a powerful tool for preventing phishing attacks. Because it is easier to trick a victim into opening a malicious link that appears real, attackers commonly utilize phishing.
Key Words: Random Forest and Decision Tree algorithms, anti-phishing methods