SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1364
Phishing Website Detection Paradigm using XGBoost
Sumera Anjum1, T. Uma Devi2, K.K. Namish3, B. Vasundhara Devi4
1,2,3Student, Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology
4 Assistant Professor, Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology,
Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - One of the largest and most potent cyber hazards
today is phishing, which costs thousands of millions of dollars
in damages resulting from data breaches that happen every
year. Due to the frequent change andshortlifespanofphishing
websites, several pattern recognition approaches have been
explored and developed to address phishing attacks, but none
of them are effective in detecting web phishing activities.
Among the most pragmatic ways to solvethischallengeis with
machine learning since it can attain statistics and handle the
changing nature of online fraud. In this project, we illustrate
using an ensemble machine learning technique, the Extreme
Gradient Boosting (XGBoost) Algorithm, to detect malicious
URLs with high precision and efficacy using the Uniform
Resource Locators. In XGBoost, the target variable yi is
predicted using training data xi repeatedly until the model's
parameters are improved by merging the trees and boosting.
As determined by the confusion matrix createdbytheXGBoost
model's performance, it accurately predicted 7393 positive
terms and 7930 negative terms with the set of features
identified from the Kaggle dataset. Its merits encompass
substantial regularisation capabilities thatreduceoverfitting,
great speed and performance since trees are created in
parallel, and flexibility because of costume optimization.
Key Words: Phishing, Website, XGBoost, ensemble,
Extreme Gradient Boosting, Uniform Resource Locator
1. INTRODUCTION
Upsurge in web users, phishing threats have grown to be a
serious problem. More than 80% of security incidents that
have been reported entail phishing attacks. These phishing
portals are cyber snoopers attempting to gather data
covertly by coercing usersintodivulgingprivateinformation
like their passwords and credit card details. Attackers
generally employ spoofing to lure consumers to malicious
websites by mimicking the names and designs of trusted
websites like Myntra, Flipkart, Amazon, and Zomato. Hence,
it is challenging for the common person to tell them apart
from legitimate websites.A UniformResourceLocator(URL)
incorporates different components, including the protocol,
domain name, port, path, query, etc. A phishing website's
URL may be differentiated from authentic ones by using a
few specific characteristics. Although, it may not be always
reliable to classify a website simply by looking at the URL.
Phishers have employed a variety of sophisticatedstrategies
to trick unsuspecting consumers, including the usage of
social engineering techniques and technology to offer
carefully designed URLs that lead users to believe that
websites are trustworthy. There are several approaches to
combat phishing, including technological, educational, and
legal means, and numerous research on the subject have
been conducted. A credible and plausible solution must be
provided to avoid jeopardizing the users' privacy. Since the
methodologies from machine learning can identify possible
threats by learning provided data and building predictive
models, it is a viable field to handle the problem in this case.
Single models that effectively process the training data and
produce substantially accurate predictions are most
commonly implemented. The algorithm predominantly is a
collection of Decision Trees, which are used by ensemble
machine learning approaches to train several categorization
models [4]. The final resultisgeneratedthrougha combining
method, such as voting (majority wins), weighted voting
(certain classifiers have more authority than others), and
averaging the results, as each constituentlearningalgorithm
will have its own separate output [4].
2. LITERATURE REVIEW
In this section, we have articulated several well-known
examples because extensive study and research have been
done on phishing detection. For detecting attacks, there are
several methods anda broadrange of data types in academic
researchandcommercialservices.URL-based,domain-based,
page-based, and content-based features gathered from
academic research for phishing domain identification
through machine learning approaches [10]. Traditional
machinelearning techniqueslikeNaveBayes,SupportVector
Machine, and Decision Tree were used in the majority of the
research on the topic. Software called "Anti Phishing
Simulator" was devisedatFiratUniversitytomakeiteasierto
identify phishing and spam emails by looking at the email
content [3]. As encouraged by Cisco, fog computing makes
use of features such as uniform resource locator (URL) and
internet activity to identify phishing websites based on a
designed neuro-fuzzy framework (dubbed Fi-NFN), and an
anti-phishing model was created to transparently monitor
and defend fog users from phishing attacks [1]. To some
extent, approaches based on visual resemblance can identify
phishing websites. The majority of web information is not
consistent, though, and when a web page's characteristics
change, the approach encounters a detection problem.
Blacklisting techniques are the basic and most commonly
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1365
used strategies in the business to stop phishing assaults [6].
Checking whether the URL of the matched website is on the
blacklist is one of the phishing detection techniques used by
Google Safe Browsing [6]. CANTINA is a content-based
phishing detection method that was proposed by Zhangetal.
The first five phrases based on TF-DF are forwarded to the
search unit for comparison with the results returned by the
search unit utilizing linkable links in the authors' approach
for identifying phishing websites [5].
3. PROPOSED SYSTEM
In this part, the working of the proposed solution is
explained in which the data collection and its processing is
the first step. The processed data is then used to train the
model with an ensemble algorithm. Testing data is used to
test the accuracy and precision of the model developed
which is displayed through the confusion matrix. In the end,
the user can enter any URL to classify it as a phishing
website or a legitimate website which is generatedasoutput
by the XGBoost paradigm.
3.1 DATASET PRE-PROCESSING
The dataset which is used in this project is obtained from
Kaggle. Kaggle provides the public dataset consisting of
71677 unique values. This data is fetched from google's
whois API which tells us more about the current status of the
URL's registration [2]. The first step following decidingonan
algorithm is data collection,oftenknownastherequirements
stage. Despite, the fact that this step isonlybeginning,itisthe
most important and time-consuming. Because the module's
main objective is to learn about and apply cutting-edge
technology, this section pays particular focus to this
component of the project. From four primary categories, 17
factors are taken out and incorporated into the system. The
features are extracted andstoredintheCSVfile.Theresulting
CSV file is uploaded to this notebook and stored in the data
frame.
3.2 MODEL DEVELOPMENT
It's appropriate to construct the model when the essential
data has been obtained and examined. The development of
the model's architecture, the creation of orderly yet secure
codes, and model training comprise the design portion of the
project as it is now being presented. Python is being
leveraged throughout the project, thus important libraries
that are mostly used for data science are imported, and the
scripts are either created from scratch or drawn from the
web. Extreme Gradient Boost, often known as XGBoost, is a
machine learning technique that employs extreme gradient
boosting and is based on Decision Trees. The gradient
boosting method was improved by integrating parallel
processing, tree pruning, missing value handling, and
normalization to get rid of errors and inaccuracies [11]. It's a
lethal combination of hardware and softwaremetaheuristics
that uses the least amount of processing resources while
achieving bettersignificantresults.Thefundamentalpurpose
of this work is to establish certain dataset parameters that
the model will use in the future to determine whether a URL
is genuineor not. Here, eachparametertransformsintoatree
and increases the deciding factor [11]. Although these trees
might not perform as well as anticipated, by merging these
trees and boosting them, the prediction might noticeably
enhance. In XGBoost, the target variable yi is predicted using
training data xi repeatedly until the model's parameters are
improved.
3.3 PHISHING WEBSITE DETECTION
The developed paradigm is saved and tested for accuracy
with the testing data. This paradigm can be used in real-time
to classify the URLs into legitimate or phishing, given by the
user as input.
4. RESULTS
The output screenshots display the userinputsclassification
and the confusion matrix shows the performance of the
XGBoost phishing website identification model.
Fig -1: Phishing website detection output 1
Fig -2: Phishing website detection output 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1366
Fig -3: Confusion matrix of the developed XGBoost model
Fig -4: Precision graph for developed XGBoost model
5. CONCLUSIONS
Today there are more uncontrolled websites than ever
before due to a mammoth increase in internet users.
Phishing variegates over time since fraudulent websites are
often updated and do not last forever. With the use of the
Ensemble Algorithm XGBoost and a feature set well
stipulated, phishing detection using website URLs is
predicted to generate highly accurate results with a
reasonable bias-variance trade-off in a robust and efficient
manner. According to the above models'assertions,XGBoost
Classifier has the finest model performance at 86.4%. The
Python pickle module has been used to retain this model as
the regression design and demonstrates how reliable and
accurate the model is at intercepting web phishing.
REFERENCES
[1] Chuan Pham, Luong A. T. Nguyenz, Nguyen H. Tran, Eui-
Nam Huh, Choong Seon Hong, “Phishing-Aware: A
Neuro-Fuzzy Approach for Anti-Phishing on Fog
Networks”, IEEE Transactions on Network and Service
Management, 2018
[2] Aman Nagariya;
https://www.kaggle.com/aman9d/phishing-dataR.
[3] M. Baykara, Z. Z. Gürelr,6thInternational Symposiumon
Digital Forensic and Security, 1 (2018)
[4] Dharani M, Soumya Badkul, Kimaya Gharat, Amarsinh
Vidhate, and Dhanashri Bhosale, “Detection of Phishing
Websites Using Ensemble MachineLearningApproach”,
Mar 2021
[5] Zhang, Y.; Hong, J.I.; Cranor, L.F. Cantina: A content-
based approach to detecting phishing web sites. In
Proceedings of the 16th International Conference on
World Wide Web, Banff, AB, Canada,8–12May2007;pp.
639–648
[6] Jain, A.K.; Gupta, B. Comparative analysis of features-
based machine learning approaches for phishing
detection. In Proceedings of the 2016 3rd International
Conference on Computing for Sustainable Global
Development (INDIACom), New Delhi, India, 16–18
March 2016; pp. 2125–2130
[7] Lin, Y.; Liu, R.; Divakaran, D.M.; Ng, J.Y.; Chan, Q.Z.; Lu,Y.;
Si, Y.; Zhang, F.; Dong, J.S. Phishpedia: A Hybrid Deep
Learning Based Approach to Visually Identify Phishing
Webpages. In Proceedingsof the30th{USENIX}Security
Symposium ({USENIX} Security 21), Virtual Event, 11–
13 August 2021.
[8] Jiaqi Gu; Hui Xu; An Ensemble Method for Phishing
Websites Detection Based on XGBoost, 15 March 2022
[9] Musa Hajara; A.Y. Gital;Fatima Umar Zambuk; Jamilu
Usman Waziri; A comparative analysis of phishing
website detection using XGBOOST algorithm; March
2019
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1367
[10] Ebubekir Büber; “Phishing URL Detection with ML”;
https://towardsdatascience.com/phishing-domain-
detection-with-ml-5be9c99293e5, Feb 2019
[11] Nishant Nityanand Naik; “Modelling Enhanced Phishing
detection using XGBoost”;
https://norma.ncirl.ie/5512/1/nishantnityanandnaik.p
df, Aug 2021
[12] Ali Ahmad Aminu;AbdulrahmanAbdulkarim;Amatullah
Yahaya Aliyu; Muhammad Aliyu; Abdulkadir Maigari
Turaki; “Detection of Phishing WebsitesUsing Random
Forest and XGBOOST Algorithms”;
http://www.smrpi.com/images/journals/IJPAS/20.pdf;
Sep 2019
[13] Ali Aljofey, Qingshan Jiang, Abdur Rasool, Hui Chen,
Wenyin Liu, Qiang Qu & Yang Wang; “An effective
detection approach for phishingwebsitesusingURLand
HTML features”;
https://www.nature.com/articles/s41598-022-10841-
5; May 2022

More Related Content

Similar to XGBoost Phishing Detection Model

IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary AlgorithmsIRJET Journal
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET Journal
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine LearningIRJET Journal
 
Detection of Phishing Websites using machine Learning Algorithm
Detection of Phishing Websites using machine Learning AlgorithmDetection of Phishing Websites using machine Learning Algorithm
Detection of Phishing Websites using machine Learning AlgorithmIRJET Journal
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningIRJET Journal
 
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET Journal
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONIJNSA Journal
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONIRJET Journal
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection SystemIRJET Journal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDERIRJET Journal
 

Similar to XGBoost Phishing Detection Model (20)

IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET-  	  Advanced Phishing Identification Technique using Machine LearningIRJET-  	  Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
 
Detection of Phishing Websites using machine Learning Algorithm
Detection of Phishing Websites using machine Learning AlgorithmDetection of Phishing Websites using machine Learning Algorithm
Detection of Phishing Websites using machine Learning Algorithm
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced Security
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection System
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONMAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

XGBoost Phishing Detection Model

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1364 Phishing Website Detection Paradigm using XGBoost Sumera Anjum1, T. Uma Devi2, K.K. Namish3, B. Vasundhara Devi4 1,2,3Student, Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology 4 Assistant Professor, Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - One of the largest and most potent cyber hazards today is phishing, which costs thousands of millions of dollars in damages resulting from data breaches that happen every year. Due to the frequent change andshortlifespanofphishing websites, several pattern recognition approaches have been explored and developed to address phishing attacks, but none of them are effective in detecting web phishing activities. Among the most pragmatic ways to solvethischallengeis with machine learning since it can attain statistics and handle the changing nature of online fraud. In this project, we illustrate using an ensemble machine learning technique, the Extreme Gradient Boosting (XGBoost) Algorithm, to detect malicious URLs with high precision and efficacy using the Uniform Resource Locators. In XGBoost, the target variable yi is predicted using training data xi repeatedly until the model's parameters are improved by merging the trees and boosting. As determined by the confusion matrix createdbytheXGBoost model's performance, it accurately predicted 7393 positive terms and 7930 negative terms with the set of features identified from the Kaggle dataset. Its merits encompass substantial regularisation capabilities thatreduceoverfitting, great speed and performance since trees are created in parallel, and flexibility because of costume optimization. Key Words: Phishing, Website, XGBoost, ensemble, Extreme Gradient Boosting, Uniform Resource Locator 1. INTRODUCTION Upsurge in web users, phishing threats have grown to be a serious problem. More than 80% of security incidents that have been reported entail phishing attacks. These phishing portals are cyber snoopers attempting to gather data covertly by coercing usersintodivulgingprivateinformation like their passwords and credit card details. Attackers generally employ spoofing to lure consumers to malicious websites by mimicking the names and designs of trusted websites like Myntra, Flipkart, Amazon, and Zomato. Hence, it is challenging for the common person to tell them apart from legitimate websites.A UniformResourceLocator(URL) incorporates different components, including the protocol, domain name, port, path, query, etc. A phishing website's URL may be differentiated from authentic ones by using a few specific characteristics. Although, it may not be always reliable to classify a website simply by looking at the URL. Phishers have employed a variety of sophisticatedstrategies to trick unsuspecting consumers, including the usage of social engineering techniques and technology to offer carefully designed URLs that lead users to believe that websites are trustworthy. There are several approaches to combat phishing, including technological, educational, and legal means, and numerous research on the subject have been conducted. A credible and plausible solution must be provided to avoid jeopardizing the users' privacy. Since the methodologies from machine learning can identify possible threats by learning provided data and building predictive models, it is a viable field to handle the problem in this case. Single models that effectively process the training data and produce substantially accurate predictions are most commonly implemented. The algorithm predominantly is a collection of Decision Trees, which are used by ensemble machine learning approaches to train several categorization models [4]. The final resultisgeneratedthrougha combining method, such as voting (majority wins), weighted voting (certain classifiers have more authority than others), and averaging the results, as each constituentlearningalgorithm will have its own separate output [4]. 2. LITERATURE REVIEW In this section, we have articulated several well-known examples because extensive study and research have been done on phishing detection. For detecting attacks, there are several methods anda broadrange of data types in academic researchandcommercialservices.URL-based,domain-based, page-based, and content-based features gathered from academic research for phishing domain identification through machine learning approaches [10]. Traditional machinelearning techniqueslikeNaveBayes,SupportVector Machine, and Decision Tree were used in the majority of the research on the topic. Software called "Anti Phishing Simulator" was devisedatFiratUniversitytomakeiteasierto identify phishing and spam emails by looking at the email content [3]. As encouraged by Cisco, fog computing makes use of features such as uniform resource locator (URL) and internet activity to identify phishing websites based on a designed neuro-fuzzy framework (dubbed Fi-NFN), and an anti-phishing model was created to transparently monitor and defend fog users from phishing attacks [1]. To some extent, approaches based on visual resemblance can identify phishing websites. The majority of web information is not consistent, though, and when a web page's characteristics change, the approach encounters a detection problem. Blacklisting techniques are the basic and most commonly
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1365 used strategies in the business to stop phishing assaults [6]. Checking whether the URL of the matched website is on the blacklist is one of the phishing detection techniques used by Google Safe Browsing [6]. CANTINA is a content-based phishing detection method that was proposed by Zhangetal. The first five phrases based on TF-DF are forwarded to the search unit for comparison with the results returned by the search unit utilizing linkable links in the authors' approach for identifying phishing websites [5]. 3. PROPOSED SYSTEM In this part, the working of the proposed solution is explained in which the data collection and its processing is the first step. The processed data is then used to train the model with an ensemble algorithm. Testing data is used to test the accuracy and precision of the model developed which is displayed through the confusion matrix. In the end, the user can enter any URL to classify it as a phishing website or a legitimate website which is generatedasoutput by the XGBoost paradigm. 3.1 DATASET PRE-PROCESSING The dataset which is used in this project is obtained from Kaggle. Kaggle provides the public dataset consisting of 71677 unique values. This data is fetched from google's whois API which tells us more about the current status of the URL's registration [2]. The first step following decidingonan algorithm is data collection,oftenknownastherequirements stage. Despite, the fact that this step isonlybeginning,itisthe most important and time-consuming. Because the module's main objective is to learn about and apply cutting-edge technology, this section pays particular focus to this component of the project. From four primary categories, 17 factors are taken out and incorporated into the system. The features are extracted andstoredintheCSVfile.Theresulting CSV file is uploaded to this notebook and stored in the data frame. 3.2 MODEL DEVELOPMENT It's appropriate to construct the model when the essential data has been obtained and examined. The development of the model's architecture, the creation of orderly yet secure codes, and model training comprise the design portion of the project as it is now being presented. Python is being leveraged throughout the project, thus important libraries that are mostly used for data science are imported, and the scripts are either created from scratch or drawn from the web. Extreme Gradient Boost, often known as XGBoost, is a machine learning technique that employs extreme gradient boosting and is based on Decision Trees. The gradient boosting method was improved by integrating parallel processing, tree pruning, missing value handling, and normalization to get rid of errors and inaccuracies [11]. It's a lethal combination of hardware and softwaremetaheuristics that uses the least amount of processing resources while achieving bettersignificantresults.Thefundamentalpurpose of this work is to establish certain dataset parameters that the model will use in the future to determine whether a URL is genuineor not. Here, eachparametertransformsintoatree and increases the deciding factor [11]. Although these trees might not perform as well as anticipated, by merging these trees and boosting them, the prediction might noticeably enhance. In XGBoost, the target variable yi is predicted using training data xi repeatedly until the model's parameters are improved. 3.3 PHISHING WEBSITE DETECTION The developed paradigm is saved and tested for accuracy with the testing data. This paradigm can be used in real-time to classify the URLs into legitimate or phishing, given by the user as input. 4. RESULTS The output screenshots display the userinputsclassification and the confusion matrix shows the performance of the XGBoost phishing website identification model. Fig -1: Phishing website detection output 1 Fig -2: Phishing website detection output 2
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1366 Fig -3: Confusion matrix of the developed XGBoost model Fig -4: Precision graph for developed XGBoost model 5. CONCLUSIONS Today there are more uncontrolled websites than ever before due to a mammoth increase in internet users. Phishing variegates over time since fraudulent websites are often updated and do not last forever. With the use of the Ensemble Algorithm XGBoost and a feature set well stipulated, phishing detection using website URLs is predicted to generate highly accurate results with a reasonable bias-variance trade-off in a robust and efficient manner. According to the above models'assertions,XGBoost Classifier has the finest model performance at 86.4%. The Python pickle module has been used to retain this model as the regression design and demonstrates how reliable and accurate the model is at intercepting web phishing. REFERENCES [1] Chuan Pham, Luong A. T. Nguyenz, Nguyen H. Tran, Eui- Nam Huh, Choong Seon Hong, “Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks”, IEEE Transactions on Network and Service Management, 2018 [2] Aman Nagariya; https://www.kaggle.com/aman9d/phishing-dataR. [3] M. Baykara, Z. Z. Gürelr,6thInternational Symposiumon Digital Forensic and Security, 1 (2018) [4] Dharani M, Soumya Badkul, Kimaya Gharat, Amarsinh Vidhate, and Dhanashri Bhosale, “Detection of Phishing Websites Using Ensemble MachineLearningApproach”, Mar 2021 [5] Zhang, Y.; Hong, J.I.; Cranor, L.F. Cantina: A content- based approach to detecting phishing web sites. In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada,8–12May2007;pp. 639–648 [6] Jain, A.K.; Gupta, B. Comparative analysis of features- based machine learning approaches for phishing detection. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 2125–2130 [7] Lin, Y.; Liu, R.; Divakaran, D.M.; Ng, J.Y.; Chan, Q.Z.; Lu,Y.; Si, Y.; Zhang, F.; Dong, J.S. Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. In Proceedingsof the30th{USENIX}Security Symposium ({USENIX} Security 21), Virtual Event, 11– 13 August 2021. [8] Jiaqi Gu; Hui Xu; An Ensemble Method for Phishing Websites Detection Based on XGBoost, 15 March 2022 [9] Musa Hajara; A.Y. Gital;Fatima Umar Zambuk; Jamilu Usman Waziri; A comparative analysis of phishing website detection using XGBOOST algorithm; March 2019
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume 9 Issue 12, Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1367 [10] Ebubekir Büber; “Phishing URL Detection with ML”; https://towardsdatascience.com/phishing-domain- detection-with-ml-5be9c99293e5, Feb 2019 [11] Nishant Nityanand Naik; “Modelling Enhanced Phishing detection using XGBoost”; https://norma.ncirl.ie/5512/1/nishantnityanandnaik.p df, Aug 2021 [12] Ali Ahmad Aminu;AbdulrahmanAbdulkarim;Amatullah Yahaya Aliyu; Muhammad Aliyu; Abdulkadir Maigari Turaki; “Detection of Phishing WebsitesUsing Random Forest and XGBOOST Algorithms”; http://www.smrpi.com/images/journals/IJPAS/20.pdf; Sep 2019 [13] Ali Aljofey, Qingshan Jiang, Abdur Rasool, Hui Chen, Wenyin Liu, Qiang Qu & Yang Wang; “An effective detection approach for phishingwebsitesusingURLand HTML features”; https://www.nature.com/articles/s41598-022-10841- 5; May 2022