Javascript must be enabled to continue!
Review on Phishing Attack Detection using Recurrent Neural Network
View through CrossRef
Phishing is a crime that involves the theft of personal information from users. Individuals, corporations, cloud storage, and government websites are all targets for the phishing websites. Anti-phishing technologies based on hardware are commonly utilised, while software-based options are preferred due to cost and operational considerations. Current phishing detection systems have no solution for problems like zero-day phishing assaults. To address these issues, a three-phase attack detection system called the Phishing Attack Detector based on Web Crawler was suggested, which uses a recurrent neural network to precisely detect phishing incidents. Based on the classification of phishing and non-phishing pages, it covers the input features Web traffic, web content, and Uniform Resource Locator (URL).
Title: Review on Phishing Attack Detection using Recurrent Neural Network
Description:
Phishing is a crime that involves the theft of personal information from users.
Individuals, corporations, cloud storage, and government websites are all targets for the phishing websites.
Anti-phishing technologies based on hardware are commonly utilised, while software-based options are preferred due to cost and operational considerations.
Current phishing detection systems have no solution for problems like zero-day phishing assaults.
To address these issues, a three-phase attack detection system called the Phishing Attack Detector based on Web Crawler was suggested, which uses a recurrent neural network to precisely detect phishing incidents.
Based on the classification of phishing and non-phishing pages, it covers the input features Web traffic, web content, and Uniform Resource Locator (URL).
Related Results
Phishing Cyber Security Threats
Phishing Cyber Security Threats
Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. ...
Deep Learning Based Phishing Websites Detection
Deep Learning Based Phishing Websites Detection
Phishing is a crime that involves the theft of confidential user information. Those targeted by phishing websites include individuals, small businesses, cloud storage providers, an...
The need for education on phishing: a survey comparison of the UK and Qatar
The need for education on phishing: a survey comparison of the UK and Qatar
PurposeThis paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phi...
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
Phishing attacks remain one of the most prevalent and damaging cybersecurity threats, targeting users across various communication channels such as email, social media, and SMS. Tr...
Identification of Phishing Urls Using Machine Learning
Identification of Phishing Urls Using Machine Learning
Abstract
Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing sit...
Detection of Phishing Threats Using Neural Networks
Detection of Phishing Threats Using Neural Networks
Today, the Internet is an effective channel for social interaction worldwide, but it also opens up great opportunities for cyberattacks. Recently, the number of botnets and phishin...
Detecting Phishing Website with Machine Learning
Detecting Phishing Website with Machine Learning
Attacks are many types to disturb the network or any other websites. Phishing attacks (PA) are a type of attacks which attack the website and damage the website and may lose the da...
Impact of Phishing Attack on Business
Impact of Phishing Attack on Business
Phishing attacks are a major threat to business, using tricks to manipulate employees into giving away sensitive information. This chapter explores how phishing attacks impact busi...

