SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Government College of Engineering, Amravati
2023-24
Cross-platform Phishing Detection and
Classification
Seminar On
Presented By -Tejas Lakade
Information Technology Department
Seminar Guide
D.R.Uike
Head of Department
Prof. A. W. Bhade
DETECT AND CLASSIFY PHISHING ATTACKS
Develop methods and techniques to accurately
identify and classify phishing attacks across multiple
platforms.
ENHANCE CYBERSECURITY
Provide effective countermeasures to improve the
overall cybersecurity posture and protect users from
malicious phishing attempts.
ENABLE PROACTIVE RESPONSE
Enable organizations to proactively respond to
evolving phishing techniques by staying ahead of
attackers.
Aim and
Objectives
Background and Motivation
RISING THREAT OF PHISHING
Phishing attacks caused
$21.6 million loss between
January & June 2012
For Q1 2022, LinkedIn was
the most imitated brand for
phishing attempts globally
45.56% of emails sent in
2021 were spam
USER VULNERABILITY
Phishing sites mimic real
ones, making it tough to spot
the difference in designs
False urgency in phishing
leads users to rush actions,
overlooking authenticity and
risking errors
NEED FOR CROSS-PLATFORM
SOLUTION
Provide consistent defense
across smartphones, tablets,
computers, and IoT for
comprehensive protection.
Maintaining proactive
security against emerging
threats on multiple platforms.
What is Phishing ?
A phishing attack is a method of tricking
users into unknowingly providing
personal and financial information or
sending funds to attackers.
The most common form is to use email
to provide a link to what appears to be a
legitimate site but is actually a malicious
site controlled by the attacker.
How it Works?
Email Platform
Social Media
Messaging Application
Websites and Online Portals
Platforms Vulnerable to Phishing Attacks
Solution And Approaches
Classification-Based Algorithms and Various Solutions
Various solutions
Decision tree and random forest
Naive Bayes
Neural Networks
Support vector machine (SVM)
Why SVM is suitable
Effective in high dimensional spaces
Robust over
Optimize margin between classes
Works well with limited data
How SVM Works For Classification
Steps
Data Collection
Dataset Splitting and Feature Engineering
Model Training
Model Evaluation
Fine-Tuning and Optimization
EMAIL PLATFORM
Spam Filtering
Enterprise Email Security
Applications
WEB BROWSER
Browser Extension
Security Suites
SOCIAL MEDIA
Link Scanning
Profile Safety Measure
MOBILE APPLICATION
Mobile Security Apps
In-build Browser Security
Future Scope
In the future, cross-platform phishing
detection will advance through
ensemble learning, combining varied
features from URLs, content, and
network behaviors. Deep learning
models, like convolutional and recurrent
neural networks, will ensure real-time
threat identification across devices.
Behavioral analysis and adaptable
systems will swiftly evolve against
emerging phishing strategies, supported
by user-friendly interfaces offering
instant alerts.
Conclusion
Phishing will never be completely eradicated.
However, a combination of good organization
and practice, proper application of current
technologies, and improvements in security
technology has the potential to drastically
reduce the prevalence of phishing and the losses
suffered from it.User education remains the
strongest and at the same time, the weakest link
to phishing counter measures.
References
Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based Associative Classification data
mining. Expert Systems with Applications, 5948-5959.
Akanbi, O. A., Amiri, I. S., & Fezaldehkordi, E. (2015). A Machine Learning Approach to Phishing Detection
and Defense. ELSEVIER.
Anti-Phishing Working Group, J. (2017, Feb. 23). Phishing Activity Trends Report, 4th Quarter 2016.
Retrieved March 10, 2017, from APWG: https://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf
Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning. 20(3): 273-297.
Fang, X., Koceja, N., Zhan, J., Dozier, G., & Dipankar, D. (2012). An Artificial Immune System for Phishing
Detection. IEEE World Congress on Computational Intelligence.
Jain, A. K., & Gupta, B. B. (2016). Comparative Analysis of Features Based Machine Learning Approaches
for Phishing Detection.
International Conference on Computing for Sustainable Global Development (INDIACom), (pp. 2125-
2130).
Do you have any
questions?
We hope you learned something new.

Contenu connexe

Similaire à Seminar On.pdf

Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkIJNSA Journal
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkIJNSA Journal
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfMobibizIndia1
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksMark D. Webster, Ph.D.
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsBRNSSPublicationHubI
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
ABSTRACT(21107007).pdf
ABSTRACT(21107007).pdfABSTRACT(21107007).pdf
ABSTRACT(21107007).pdfTejasLakade
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxjeanettehully
 

Similaire à Seminar On.pdf (20)

Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention Methods
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
ABSTRACT(21107007).pdf
ABSTRACT(21107007).pdfABSTRACT(21107007).pdf
ABSTRACT(21107007).pdf
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Seminar On.pdf

  • 1. Government College of Engineering, Amravati 2023-24 Cross-platform Phishing Detection and Classification Seminar On Presented By -Tejas Lakade Information Technology Department Seminar Guide D.R.Uike Head of Department Prof. A. W. Bhade
  • 2. DETECT AND CLASSIFY PHISHING ATTACKS Develop methods and techniques to accurately identify and classify phishing attacks across multiple platforms. ENHANCE CYBERSECURITY Provide effective countermeasures to improve the overall cybersecurity posture and protect users from malicious phishing attempts. ENABLE PROACTIVE RESPONSE Enable organizations to proactively respond to evolving phishing techniques by staying ahead of attackers. Aim and Objectives
  • 3. Background and Motivation RISING THREAT OF PHISHING Phishing attacks caused $21.6 million loss between January & June 2012 For Q1 2022, LinkedIn was the most imitated brand for phishing attempts globally 45.56% of emails sent in 2021 were spam USER VULNERABILITY Phishing sites mimic real ones, making it tough to spot the difference in designs False urgency in phishing leads users to rush actions, overlooking authenticity and risking errors NEED FOR CROSS-PLATFORM SOLUTION Provide consistent defense across smartphones, tablets, computers, and IoT for comprehensive protection. Maintaining proactive security against emerging threats on multiple platforms.
  • 4. What is Phishing ? A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common form is to use email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker.
  • 6. Email Platform Social Media Messaging Application Websites and Online Portals Platforms Vulnerable to Phishing Attacks
  • 7. Solution And Approaches Classification-Based Algorithms and Various Solutions Various solutions Decision tree and random forest Naive Bayes Neural Networks Support vector machine (SVM) Why SVM is suitable Effective in high dimensional spaces Robust over Optimize margin between classes Works well with limited data
  • 8. How SVM Works For Classification
  • 9. Steps Data Collection Dataset Splitting and Feature Engineering Model Training Model Evaluation Fine-Tuning and Optimization
  • 10. EMAIL PLATFORM Spam Filtering Enterprise Email Security Applications WEB BROWSER Browser Extension Security Suites SOCIAL MEDIA Link Scanning Profile Safety Measure MOBILE APPLICATION Mobile Security Apps In-build Browser Security
  • 11. Future Scope In the future, cross-platform phishing detection will advance through ensemble learning, combining varied features from URLs, content, and network behaviors. Deep learning models, like convolutional and recurrent neural networks, will ensure real-time threat identification across devices. Behavioral analysis and adaptable systems will swiftly evolve against emerging phishing strategies, supported by user-friendly interfaces offering instant alerts.
  • 12. Conclusion Phishing will never be completely eradicated. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.User education remains the strongest and at the same time, the weakest link to phishing counter measures.
  • 13. References Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection based Associative Classification data mining. Expert Systems with Applications, 5948-5959. Akanbi, O. A., Amiri, I. S., & Fezaldehkordi, E. (2015). A Machine Learning Approach to Phishing Detection and Defense. ELSEVIER. Anti-Phishing Working Group, J. (2017, Feb. 23). Phishing Activity Trends Report, 4th Quarter 2016. Retrieved March 10, 2017, from APWG: https://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning. 20(3): 273-297. Fang, X., Koceja, N., Zhan, J., Dozier, G., & Dipankar, D. (2012). An Artificial Immune System for Phishing Detection. IEEE World Congress on Computational Intelligence. Jain, A. K., & Gupta, B. B. (2016). Comparative Analysis of Features Based Machine Learning Approaches for Phishing Detection. International Conference on Computing for Sustainable Global Development (INDIACom), (pp. 2125- 2130).
  • 14. Do you have any questions? We hope you learned something new.