Phishing Detection by determining reliability factor using rough set theory

12/10/2013
by   Anugrah Kumar, et al.
0

Phishing is a common online weapon, used against users, by Phishers for acquiring a confidential information through deception. Since the inception of internet, nearly everything, ranging from money transaction to sharing information, is done online in most parts of the world. This has also given rise to malicious activities such as Phishing. Detecting Phishing is an intricate process due to complexity, ambiguity and copious amount of possibilities of factors responsible for phishing . Rough sets can be a powerful tool, when working on such kind of Applications containing vague or imprecise data. This paper proposes an approach towards Phishing Detection Using Rough Set Theory. The Thirteen basic factors, directly responsible towards Phishing, are grouped into four Strata. Reliability Factor is determined on the basis of the outcome of these strata, using Rough Set Theory . Reliability Factor determines the possibility of a suspected site to be Valid or Fake. Using Rough set Theory most and the least influential factors towards Phishing are also determined.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/07/2014

Determining the Consistency factor of Autopilot using Rough Set Theory

Autopilot is a system designed to guide a vehicle without aid. Due to in...
research
04/12/2023

Pseudo-Kleene algebras determined by rough sets

We study the pseudo-Kleene algebras of the Dedekind-MacNeille completion...
research
04/18/2021

Rough Sets in Graphs Using Similarity Relations

In this paper, we use theory of rough set to study graphs using the conc...
research
11/06/2020

Defining rough sets as core-support pairs of three-valued functions

We answer to the question what properties a collection ℱ of three-valued...
research
12/10/2013

Improving circuit miniaturization and its efficiency using Rough Set Theory

High-speed, accuracy, meticulousness and quick response are notion of th...
research
09/12/2009

Back analysis based on SOM-RST system

This paper describes application of information granulation theory, on t...
research
09/08/2009

Resource Matchmaking Algorithm using Dynamic Rough Set in Grid Environment

Grid environment is a service oriented infrastructure in which many hete...

Please sign up or login with your details

Forgot password? Click here to reset