𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

A Machine-Learning Approach to Phishing Detection and Defense

✍ Scribed by I.S. Amiri, O.A. Akanbi, E. Fazeldehkordi


Publisher
Syngress
Year
2014
Tongue
English
Leaves
84
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.

  • Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks
  • Help your business or organization avoid costly damage from phishing sources
  • Gain insight into machine-learning strategies for facing a variety of information security threats

✦ Table of Contents


Content:
Front matter, Page iii
Copyright, Page iv
Abstract, Page ix
List of Abbreviation, Page xv
Chapter 1 - Introduction, Pages 1-8
Chapter 2 - Literature Review, Pages 9-33
Chapter 3 - Research Methodology, Pages 35-43
Chapter 4 - Feature Extraction, Pages 45-54
Chapter 5 - Implementation and Result, Pages 55-73
Chapter 6 - Conclusions, Pages 75-79
References, Pages 81-84


πŸ“œ SIMILAR VOLUMES


A Machine-Learning Approach to Phishing
✍ O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers,Β and user logins and passwords, as well as other information entered via a web site. The authors of <b><i>A Machine-Learning Approach to Phishi

Intrusion Detection: A Machine Learning
✍ Zhenwei Yu, Jeffrey J P Tsai πŸ“‚ Library πŸ“… 2011 πŸ› Imperial College Press 🌐 English

This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (Ids), and presents the architecture and implementation of Ids. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques fo

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization a

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization a

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><