Phishing Detection
Phishing Detection
legitimate. Since its inception in the entities. These methods are designed
Feature Selection
Methods
Effective feature
selection is crucial for improving the
accuracy of machine
learning models. Techniques
2
such as
dimensionality reduction and importance
scoring prioritize
relevant features, thus enhancing
model performance
in detecting phishing URLs.
03
Proposed Phishing Detection
System
System Overview
The primary objective of this study is This study utilizes a curated dataset
to develop a robust phishing detection containing attributes of both phishing
system that combines various and legitimate URLs. Sourced from a
machine learning algorithms to reputable dataset repository, it
achieve high accuracy in identifying comprises over 11,000 entries used
phishing URLs, thereby improving for training and evaluating the
user security. proposed models.
Machine Learning Approaches
The proposed system employs multiple The Hybrid LSD model integrates Logistic
machine learning algorithms, including Regression, Support Vector Machine, and
Decision Tree, Random Forest, and Decision Tree into a single framework.
Naive Bayes. Each algorithm contributes Utilizing both soft and hard
voting
unique strengths to enhance overall techniques, this model aims to maximize
detection performance. detection rates and minimize false
positives.
04
System Design and Architecture
System Architecture
Input Requirements
Output
Specifications
Effectiveness of Proposed
System Lessons Learned
The proposed system demonstrates Key lessons from this study include the
significant effectiveness in detecting importance of feature selection and the
phishing attacks, achieving a higher need for continuous updates to the models
accuracy rate compared to existing as phishing tactics evolve. Dynamic
models. This success underscores the adaptations are essential for
maintaining
potential of hybrid machine learning detection
efficacy.
approaches in cybersecurity.
Recommendations for Future Research
Expanding Research in
Potential Improvements
Cybersecurity