SlideShare a Scribd company logo
1 of 42
ADEDIRAN ADENIYI GOODNESS
DETECTION OF PHISHING WEBSITES USING
MACHINE LEARNING
(SSE/017/18295)
BY
SUPERVISED BY DR. A.O. AKINWUNMI
PRESENTATION OUTLINE
AIM AND
OBJECTIVES
03
STATEMENT OF
PROBLEM
02
INTRODUCTION
01
PRESENTATION OUTLINE
SCOPE
OF
STUDY
04
SIGNIFICANCE
OF STUDY
05
METHODOLOGY
06
PRESENTATION OUTLINE
LITERATURE
REVIEW
07
BENEFIT OF
PROPOSED
SYSTEM
08 09
EXISTING AND
PROPOSED
SYSTEM
PRESENTATION OUTLINE
10 11
SYSTEM DESIGN
(Diagram)
12
IMPLEMENTATION
&
CONTRIBUTION TO
KNOWLEDGE
CONCLUSION
REFERENCE
INTRODUCTION
The Internet global connectivity is regarded as a
crossroads where users can meet and share
information. This is the primary reason phishers
choose this method of data exchange as a point
of contact to conduct widespread phishing
attacks by infecting computers with spyware that
directs people to bogus websites.
Phishing attack is one of the most dangerous
threats to online accounts and data because these
attacks pose as a trustworthy firm or person, and
they employ social engineering techniques to
make victims more likely to fall for the scam. (Source: Designed by Freepik, n.d.)
STATEMENT OF PROBLEM
Phishing attacks have gotten increasingly complex,
it is very difficult for an average person to
determine if an email message link or website is
legitimate. Cyber-attacks by criminals that employ
phishing schemes are so prevalent and successful
nowadays.
Hence, this project seeks to address fake URLs and
domain names by identifying phishing website
links. Therefore, having a web application that
provides the user an interface to check if a URL is
Phishing or legitimate will help decrease security
risks to individuals and organizations.
(Source: Designed by Freepik, n.d.)
AIM
The aim of this project is to detect phishing websites using machine learning and
deep neural networks by developing a web application that allows users to check if
a URL is phishing or legitimate and have access to resources to help tackle
phishing attacks.
OBJECTIVES
i. dataset collection and pre-processing;
ii. machine learning model selection and development ;
iii. development of a web-based application for detection;
iv. Integration of the developed model to web application (Source: Designed by Freepik, n.d.)
SCOPE OF STUDY
This study explores machine
learning models that uses datasets
gotten from open-source platform
to analyze website links and
distinguish between phishing and
legitimate URL links.
The model will be integrated into
a web application, allowing a user
to predict if a URL link is
legitimate or phishing. This
online application is compatible
with a variety of browsers.
(Source: Designed by Freepik, n.d.)
SIGNIFICANCE OF THE PROJECT
Due to the fraudulent websites built on the World Wide Web in the previous decade to
mimic reputable websites and steal financial assets from users and organizations. Hence
phishing attack has become so prevalent such that it has cost the internet community and
other stakeholders hundreds of millions of dollars. Thus, robust countermeasures that can
identify phishing are required.
These are the challenges to be addressed in this project:
I. Reduce the rate of financial theft from individuals and organizations online.
II. Educate Internet Users on the deception technique of phishers.
III. Educate Internet users on the countermeasures of phishing attack.
Image of Cyber attack Counter-measure (Source: Designed by Freepik, n.d.)
METHODOLOGY
An extensive review was done on existing works of literature and machine learning
models on detecting phishing websites to best decide the classification models to
solve the problem of detecting phishing websites.
Data Collection
METHODOLOGY
Architectural design of proposed system zx
LITERATURE REVIEW
ANALYSIS OF EXISTING SYSTEM
The existing system of phishing detection techniques suffer low detection
accuracy and high false alarm especially when different phishing approaches are
introduced. Above and beyond, the most common technique used is the blacklist-
based method which is inefficient in responding to emanating phishing attacks
since registering new domain has become easier, no comprehensive blacklist can
ensure a perfect up-to-date database for phishing detection.
ANALYSIS OF PROPOSED SYSTEM
The proposed phishing detection system utilizes different machine learning models and
deep neural networks. The system comprises of two major parts, which are the machine
learning models and a web application. These models consist of Decision Tree, Support
Vector Machine, XGBooster, Multilayer Perceptions, Auto Encoder Neural Network and
Random Forest.
These models are selected after different comparison based performance of multiple
machine learning algorithms. Each of these models is trained and tested on a website
content-based feature, extracted from both phishing and legitimate dataset.
Hence, the model with the highest accuracy is selected and integrated to a web application
that will enable a user to predict if a URL link is phishing or legitimate
BENEFIT OF PROPOSED SYSTEM
I. Will be able to differentiate between phishing(0) and legitimate(1) URLs
II. Will help reduce phishing data breach for organization
III. Will be helpful to individuals and organizations
IV. Will be easy to use
(Source: Credibly, n.d.)
Machine
Learning
process
Flowchart of
Web
Application
Use case of
web
Application
Implementation
Data Collection
Dataset of Phishing URLs Dataset of Legitimate URLs
INTEGRATION OF MODEL TO
WEB APPLICATION
CONTRIBUTION TO KNOWLEDGE
This project provides an efficient and effective way for detecting phishing websites (URL)
by exploring Data science classification technique.
This project tend to improve the previous technique for detecting phishing websites by
employing different machine learning classification models and deep neural network to
distinguish between phishing and legitimate URL links.
Hence, This project provides a new and faster way to help users detect if a URL link is
phishing or legitimate and also provide them access to educational resources about phishing
attacks.
(Source: Designed by Freepik, n.d.)
CONCLUSION
The contribution of this research work is to help both
individuals and organization identify and understand
phishing techniques used by phisher as well as help them
detect phishing URL attack effectively and efficiently by
employing machine learning models instead of the
previous method of detecting phishing website.
Recommendation
Through this project, one can know a lot about phishing
attacks and how to prevent them. This project can be
taken further by creating a browser extension that can be
installed on any web browser to detect phishing URL
Links.
REFERENCES
Cyber attacker hacking into email server by Freepik. (n.d.). Retrieved from
https://www.freepik.com/free-vector/cyber-attacker-hacking-into-email-
server_5259895.htm#page=1&query=cyber%20phishing&position=2
People connecting jigsaw pieces of a head together by Freepik. (n.d.). Retrieved from
https://www.freepik.com/free-vector/people-connecting-jigsaw-pieces-head-
together_3425145.htm#page=1&query=knowledge&position=4
Group of people holding question mark icons by Freepik. (n.d.). Retrieved from
https://www.freepik.com/free-vector/group-people-holding-question-mark-
icons_3530048.htm#page=1&query=PROBLEM&position=12
Golden cup with arrow hitting in the target center by Freepik. (n.d.). Retrieved from
https://www.freepik.com/free-vector/golden-cup-with-arrow-hitting-target-
center_1311358.htm#page=1&query=AIM&position=25
Affective computing abstract concept illustration by Freepik. (n.d.).Retrieved from
https://www.freepik.com/free-vector/affective-computing-abstract-concept-
illustration_11668804.htm#page=1&query=machine%20learning&position=17
THANKS FOR
LISTENING

More Related Content

Similar to Artificial intelligence presentation slides.pptx

IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 
Deep learning in phishing mitigation: a uniform resource locator-based predic...
Deep learning in phishing mitigation: a uniform resource locator-based predic...Deep learning in phishing mitigation: a uniform resource locator-based predic...
Deep learning in phishing mitigation: a uniform resource locator-based predic...IJECEIAES
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESIJCNCJournal
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesIJCNCJournal
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection SystemIRJET Journal
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsIRJET Journal
 
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSCOMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSIJCI JOURNAL
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptxCYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptxTAMILMANIP6
 
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxPHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxRajiArun7
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...IJCNCJournal
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...IJCNCJournal
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishingIJCSES Journal
 

Similar to Artificial intelligence presentation slides.pptx (20)

IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
Deep learning in phishing mitigation: a uniform resource locator-based predic...
Deep learning in phishing mitigation: a uniform resource locator-based predic...Deep learning in phishing mitigation: a uniform resource locator-based predic...
Deep learning in phishing mitigation: a uniform resource locator-based predic...
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection System
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSCOMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptxCYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
 
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptxPHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
PHISHING ATTACK AND DETECTION WITH MACHINE LEARNING TECHNIQUES.pptx
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Artificial intelligence presentation slides.pptx

  • 1. ADEDIRAN ADENIYI GOODNESS DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING (SSE/017/18295) BY SUPERVISED BY DR. A.O. AKINWUNMI
  • 5. PRESENTATION OUTLINE 10 11 SYSTEM DESIGN (Diagram) 12 IMPLEMENTATION & CONTRIBUTION TO KNOWLEDGE CONCLUSION REFERENCE
  • 6. INTRODUCTION The Internet global connectivity is regarded as a crossroads where users can meet and share information. This is the primary reason phishers choose this method of data exchange as a point of contact to conduct widespread phishing attacks by infecting computers with spyware that directs people to bogus websites. Phishing attack is one of the most dangerous threats to online accounts and data because these attacks pose as a trustworthy firm or person, and they employ social engineering techniques to make victims more likely to fall for the scam. (Source: Designed by Freepik, n.d.)
  • 7. STATEMENT OF PROBLEM Phishing attacks have gotten increasingly complex, it is very difficult for an average person to determine if an email message link or website is legitimate. Cyber-attacks by criminals that employ phishing schemes are so prevalent and successful nowadays. Hence, this project seeks to address fake URLs and domain names by identifying phishing website links. Therefore, having a web application that provides the user an interface to check if a URL is Phishing or legitimate will help decrease security risks to individuals and organizations. (Source: Designed by Freepik, n.d.)
  • 8. AIM The aim of this project is to detect phishing websites using machine learning and deep neural networks by developing a web application that allows users to check if a URL is phishing or legitimate and have access to resources to help tackle phishing attacks. OBJECTIVES i. dataset collection and pre-processing; ii. machine learning model selection and development ; iii. development of a web-based application for detection; iv. Integration of the developed model to web application (Source: Designed by Freepik, n.d.)
  • 9. SCOPE OF STUDY This study explores machine learning models that uses datasets gotten from open-source platform to analyze website links and distinguish between phishing and legitimate URL links. The model will be integrated into a web application, allowing a user to predict if a URL link is legitimate or phishing. This online application is compatible with a variety of browsers. (Source: Designed by Freepik, n.d.)
  • 10. SIGNIFICANCE OF THE PROJECT Due to the fraudulent websites built on the World Wide Web in the previous decade to mimic reputable websites and steal financial assets from users and organizations. Hence phishing attack has become so prevalent such that it has cost the internet community and other stakeholders hundreds of millions of dollars. Thus, robust countermeasures that can identify phishing are required. These are the challenges to be addressed in this project: I. Reduce the rate of financial theft from individuals and organizations online. II. Educate Internet Users on the deception technique of phishers. III. Educate Internet users on the countermeasures of phishing attack.
  • 11. Image of Cyber attack Counter-measure (Source: Designed by Freepik, n.d.)
  • 12. METHODOLOGY An extensive review was done on existing works of literature and machine learning models on detecting phishing websites to best decide the classification models to solve the problem of detecting phishing websites. Data Collection
  • 15. ANALYSIS OF EXISTING SYSTEM The existing system of phishing detection techniques suffer low detection accuracy and high false alarm especially when different phishing approaches are introduced. Above and beyond, the most common technique used is the blacklist- based method which is inefficient in responding to emanating phishing attacks since registering new domain has become easier, no comprehensive blacklist can ensure a perfect up-to-date database for phishing detection.
  • 16. ANALYSIS OF PROPOSED SYSTEM The proposed phishing detection system utilizes different machine learning models and deep neural networks. The system comprises of two major parts, which are the machine learning models and a web application. These models consist of Decision Tree, Support Vector Machine, XGBooster, Multilayer Perceptions, Auto Encoder Neural Network and Random Forest. These models are selected after different comparison based performance of multiple machine learning algorithms. Each of these models is trained and tested on a website content-based feature, extracted from both phishing and legitimate dataset. Hence, the model with the highest accuracy is selected and integrated to a web application that will enable a user to predict if a URL link is phishing or legitimate
  • 17. BENEFIT OF PROPOSED SYSTEM I. Will be able to differentiate between phishing(0) and legitimate(1) URLs II. Will help reduce phishing data breach for organization III. Will be helpful to individuals and organizations IV. Will be easy to use (Source: Credibly, n.d.)
  • 22. Data Collection Dataset of Phishing URLs Dataset of Legitimate URLs
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. INTEGRATION OF MODEL TO WEB APPLICATION
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. CONTRIBUTION TO KNOWLEDGE This project provides an efficient and effective way for detecting phishing websites (URL) by exploring Data science classification technique. This project tend to improve the previous technique for detecting phishing websites by employing different machine learning classification models and deep neural network to distinguish between phishing and legitimate URL links. Hence, This project provides a new and faster way to help users detect if a URL link is phishing or legitimate and also provide them access to educational resources about phishing attacks. (Source: Designed by Freepik, n.d.)
  • 39. CONCLUSION The contribution of this research work is to help both individuals and organization identify and understand phishing techniques used by phisher as well as help them detect phishing URL attack effectively and efficiently by employing machine learning models instead of the previous method of detecting phishing website.
  • 40. Recommendation Through this project, one can know a lot about phishing attacks and how to prevent them. This project can be taken further by creating a browser extension that can be installed on any web browser to detect phishing URL Links.
  • 41. REFERENCES Cyber attacker hacking into email server by Freepik. (n.d.). Retrieved from https://www.freepik.com/free-vector/cyber-attacker-hacking-into-email- server_5259895.htm#page=1&query=cyber%20phishing&position=2 People connecting jigsaw pieces of a head together by Freepik. (n.d.). Retrieved from https://www.freepik.com/free-vector/people-connecting-jigsaw-pieces-head- together_3425145.htm#page=1&query=knowledge&position=4 Group of people holding question mark icons by Freepik. (n.d.). Retrieved from https://www.freepik.com/free-vector/group-people-holding-question-mark- icons_3530048.htm#page=1&query=PROBLEM&position=12 Golden cup with arrow hitting in the target center by Freepik. (n.d.). Retrieved from https://www.freepik.com/free-vector/golden-cup-with-arrow-hitting-target- center_1311358.htm#page=1&query=AIM&position=25 Affective computing abstract concept illustration by Freepik. (n.d.).Retrieved from https://www.freepik.com/free-vector/affective-computing-abstract-concept- illustration_11668804.htm#page=1&query=machine%20learning&position=17