Advertisement

Classification of Phishing Websites Using Moth-Flame Optimized Neural Network

  • Santosh Kumar MajhiEmail author
  • Pragati Mahapatra
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)

Abstract

Phishing websites are taking a toll in today’s Internet-infused world. These types of websites try to attack the classified information of the user on the Internet database, masquerading as the trusted website. They even use the logo and the website address of the original website to come off as the original one to the user. In this project, we deal with the classification of such websites from the real ones using the standards set by W3C. The Moth-flame algorithm is used as a learning algorithm to optimize the feedforward neural network and to classify the websites.

References

  1. 1.
    Alkhozae, M.G., Batarfi, O.A.: Phishing websites detection based on phishing characteristics in the webpage source code. Int. J. Inf. Commun. Technol. Res. 1(6) (2011)Google Scholar
  2. 2.
    Mirjalili, S.: Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl. Based Syst. 89, 228–249 (2015)CrossRefGoogle Scholar
  3. 3.
    Mohammad, R.M., Thabtah, F., McCluskey, L.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8(3), 153–160 (2014)CrossRefGoogle Scholar
  4. 4.
    Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014)CrossRefGoogle Scholar
  5. 5.
    Prajapati, U., Sangal, N., Patole, D.: Fraud website detection using data mining. Int. J. Comput. Appl. 141(3) (2016)Google Scholar
  6. 6.
    Sananse, B.E., Sarode, T.K.: Phishing URL detection: a machine learning and web mining-based approach. Int. J. Comput. Appl. 123(13) (2015)Google Scholar
  7. 7.
    Yamany, W., Fawzy, M., Tharwat, A., Hassanien, A.E.: Moth-flame optimization for training multi-layer perceptrons. In: 2015 11th International Computer Engineering Conference (ICENCO), pp. 267–272. IEEE, Dec 2015Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Veer Surendra Sai University of TechnologyBurlaIndia

Personalised recommendations