SlideShare a Scribd company logo
MINI PROJECT
XBNET CLASSIFIER IN PHISHING ATTACK
DETECTION
GUIDED BY:
DR.CHANDRA MOULI P.V.S.S.R.
ASSOCIATE PROFESSOR
HEAD OF THE DEPARTMENT
DEPARTMENT OF COMPUTER SCIENCE
PRESENTED BY:
KAVITA – P211307
M.Sc. COMPUTER SCIENCE,
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
• Phishing isa form of cybercrime inwhich a target iscontacted via
email, telephone, or text message by an attacker disguising as a
reputable entity or person.
• XBNet (Extremely Boosted Neural Network), is combination of
tree-based models with neural networks to create a robust
architecture.
• It is trained by using a novel optimization technique, Boosted
Gradient Descent for Tabular Data which increases its
interpretability and performance.
DEPARTMENT OF COMPUTER SCIENCE
INTRODUCTION
The purpose of this project is to help individuals identify these
phishing URLs in order to provide safer practices online.
A popular model for tabular data is boosted trees, a highly
efficacious and extensively used XBNet classifier, and it also
provides good interpretability compared to neural networks
DEPARTMENT OF COMPUTER SCIENCE
AIM OF THE PROJECT
Types of Phishing Tactics
96% of phishing attacks arrive by email.
3% of phishing attacks is done over the telephone.
This is also known as vishing.
1% of phishing attacks is done via text message.
This is known as smishing.
Email
Telephone
Text
Message
DEPARTMENT OF COMPUTER SCIENCE
EXAMPLE
DEPARTMENT OF COMPUTER SCIENCE
30%of phishing emails
are opened by users
12%of these targeted
users click on the
malicious link or
attachment.
97%of the users are
unable to recognize a
sophisticated phishing
email.
2022Phishing Statistics
DEPARTMENT OF COMPUTER SCIENCE
XBNET ON PHISHING
DATASET
DEPARTMENT OF COMPUTER SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
DATASET
FEATURE
EXTRACTION
DEPARTMENT OF COMPUTER SCIENCE
- =
.
?
@ ~
&
! +
*
, #
$
%
space
Feature Extraction
Lengthof URL,domain, path, query,and fragment
are extracted.
Quantity of specific characters in URL, domain,
path, query, and fragment are extracted. These
characters include:
50 T
otal Features Used in Model
DEPARTMENT OF COMPUTER SCIENCE
Feature Extraction
Using a function from urllib library, protocol, domain, path, query, and
fragment were extracted from the URL and respective columns were created.
The protocol column was dropped as more sophisticated phishing URLs are
labeled secure with https:/.
DEPARTMENT OF COMPUTER SCIENCE
MODEL
SELECTION &
EVALUATION
DEPARTMENT OF COMPUTER SCIENCE
ARCHITECTURE OF XBNET
This architecture consists two parts.
Firstly, instead of randomly initializing weights for gradient
descent in the first iteration, we train our tree first and the feature
importance given by the tree are used as weights in the first
iteration.
Secondly, we decrease the magnitude of the value of feature
importance as given in the algorithm during backward propagation
so that instead of creating a big change in the weights, it just
slightly nudges it, thus not disrupting the process.
DEPARTMENT OF COMPUTER SCIENCE
ARCHITECTURE OF XBNET
Model Evaluation
DEPARTMENT OF COMPUTER SCIENCE
CONCLUSIONS
DEPARTMENT OF COMPUTER SCIENCE
How to Avoid Phishing Attacks
ST
AY INFORMED
Learn about new phishing techniques
that are being developed to avoid
falling prey to one.
UTILIZE ‘FISHING FOR PHISHERS’
When in doubt, use the ‘Fishing for
Phishers’ app to verify the
authenticity of a website.
THINK BEFORE YOU CLICK
Never click on hyperlinks
without examining the hidden
URL.
1
2
3
DEPARTMENT OF COMPUTER SCIENCE
XBNet requires more time and resources for training as we train a gradient-boosted
tree in every layer.
Currently, XBNet only works on tabular data and is unable to process unstructured
data. If it is extended for usage in unstructured data, the number of parameters will
see a drastic jump, and hence care has to be taken with respect to it.
DEPARTMENT OF COMPUTER SCIENCE
LIMITATION AND FUTURE WORK
Thank you!
Any questions?
DEPARTMENT OF COMPUTER SCIENCE
REFERENCES
Sarkar T."XBNet: An extremely
boosted neural network", Intelligent
Systems with Applications, Vol.15
2022,
https://doi.org/10.1016/j.iswa.2022.
200097

More Related Content

Similar to Phishing Detection .pptx

NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 

Similar to Phishing Detection .pptx (20)

IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
Chp11 infrastructure for ec
Chp11 infrastructure for ecChp11 infrastructure for ec
Chp11 infrastructure for ec
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
Butler
ButlerButler
Butler
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 

Recently uploaded

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (13)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 

Phishing Detection .pptx

  • 1. MINI PROJECT XBNET CLASSIFIER IN PHISHING ATTACK DETECTION GUIDED BY: DR.CHANDRA MOULI P.V.S.S.R. ASSOCIATE PROFESSOR HEAD OF THE DEPARTMENT DEPARTMENT OF COMPUTER SCIENCE PRESENTED BY: KAVITA – P211307 M.Sc. COMPUTER SCIENCE, DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF COMPUTER SCIENCE
  • 2. • Phishing isa form of cybercrime inwhich a target iscontacted via email, telephone, or text message by an attacker disguising as a reputable entity or person. • XBNet (Extremely Boosted Neural Network), is combination of tree-based models with neural networks to create a robust architecture. • It is trained by using a novel optimization technique, Boosted Gradient Descent for Tabular Data which increases its interpretability and performance. DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION
  • 3. The purpose of this project is to help individuals identify these phishing URLs in order to provide safer practices online. A popular model for tabular data is boosted trees, a highly efficacious and extensively used XBNet classifier, and it also provides good interpretability compared to neural networks DEPARTMENT OF COMPUTER SCIENCE AIM OF THE PROJECT
  • 4. Types of Phishing Tactics 96% of phishing attacks arrive by email. 3% of phishing attacks is done over the telephone. This is also known as vishing. 1% of phishing attacks is done via text message. This is known as smishing. Email Telephone Text Message DEPARTMENT OF COMPUTER SCIENCE
  • 6. 30%of phishing emails are opened by users 12%of these targeted users click on the malicious link or attachment. 97%of the users are unable to recognize a sophisticated phishing email. 2022Phishing Statistics DEPARTMENT OF COMPUTER SCIENCE
  • 8. DEPARTMENT OF COMPUTER SCIENCE DATASET
  • 10. - = . ? @ ~ & ! + * , # $ % space Feature Extraction Lengthof URL,domain, path, query,and fragment are extracted. Quantity of specific characters in URL, domain, path, query, and fragment are extracted. These characters include: 50 T otal Features Used in Model DEPARTMENT OF COMPUTER SCIENCE
  • 11. Feature Extraction Using a function from urllib library, protocol, domain, path, query, and fragment were extracted from the URL and respective columns were created. The protocol column was dropped as more sophisticated phishing URLs are labeled secure with https:/. DEPARTMENT OF COMPUTER SCIENCE
  • 14. This architecture consists two parts. Firstly, instead of randomly initializing weights for gradient descent in the first iteration, we train our tree first and the feature importance given by the tree are used as weights in the first iteration. Secondly, we decrease the magnitude of the value of feature importance as given in the algorithm during backward propagation so that instead of creating a big change in the weights, it just slightly nudges it, thus not disrupting the process. DEPARTMENT OF COMPUTER SCIENCE ARCHITECTURE OF XBNET
  • 15. Model Evaluation DEPARTMENT OF COMPUTER SCIENCE
  • 17. How to Avoid Phishing Attacks ST AY INFORMED Learn about new phishing techniques that are being developed to avoid falling prey to one. UTILIZE ‘FISHING FOR PHISHERS’ When in doubt, use the ‘Fishing for Phishers’ app to verify the authenticity of a website. THINK BEFORE YOU CLICK Never click on hyperlinks without examining the hidden URL. 1 2 3 DEPARTMENT OF COMPUTER SCIENCE
  • 18. XBNet requires more time and resources for training as we train a gradient-boosted tree in every layer. Currently, XBNet only works on tabular data and is unable to process unstructured data. If it is extended for usage in unstructured data, the number of parameters will see a drastic jump, and hence care has to be taken with respect to it. DEPARTMENT OF COMPUTER SCIENCE LIMITATION AND FUTURE WORK
  • 20. REFERENCES Sarkar T."XBNet: An extremely boosted neural network", Intelligent Systems with Applications, Vol.15 2022, https://doi.org/10.1016/j.iswa.2022. 200097