A Plug in Implementation for Phishing Attacks Using C4.5 Algorithm

Download Now
Provided by: International Journal of Recent Development in Engineering and Technology (IJRDET)
Topic: Security
Format: PDF
Rapid increase in the size of web users. Users enter sensitive information such as passwords, their personal and professional information into scam web sites. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, for some illegitimate purpose. Such scam sites cause substantial damages to individuals and corporations. These attacks can be analyzed through this paper and a plug in is designed which provide security from the fake websites. This paper is improved by using decision tree C4.5 over ID3 and a comparison is drawn.
Download Now

Find By Topic