ARTICLE
TITLE

Similarity measure fuzzy soft set for phishing detection

SUMMARY

Phishing is a serious web security problem, and the internet fraud technique involves mirroring genuine websites to trick online users into stealing their sensitive information and taking out their personal information, such as bank account information, usernames, credit card, and passwords. Early detection can prevent phishing behavior makes quick protection of personal information. Classification methods can be used to predict this phishing behavior. This paper presents an intelligent classification model for detecting Phishing by redefining a fuzzy soft set (FSS) theory for better computational performance. There are four types of similarity measures: (1) Comparison table, (2) Matching function, (3) Similarity measure, and (4) Distance measure. The experiment showed that the Similarity measure has better performance than the others in accuracy and recall, reached 95.45 % and 99.77 %, respectively. It concludes that FSS similarity measured is more precise than others, and FSS could be a promising approach to avoid phishing activities. This novel method can be implemented in social media software to warn the users as an early warning system. This model can be used for personal or commercial purposes on social media applications to protect sensitive data.

 Articles related

Alexandra González Eras, Pablo Quezada Sarmiento    

ABSTRACTThis research is a first contribution of a schema to match professional and work competencies through similarity measures. In this contribution we focus on the determination of connections between universities profiles with standards (baselines) ... see more

Revista: MASKANA

Maryam Yaghtin,Hajar Sotudeh,Mehdi Mohammadi,Mahdieh Mirzabeigi,Seyed Mostafa Fakhrahmad    

Co-citation forms a relational document network. Co-citation-based measures are found to be effective in retrieving relevant documents. However, they are far from ideal and need further enhancements. Co-opinion concept was proposed and tested in previous... see more


Su Gon Cho,Seoung Bum Kim    

Measuring document similarity has shown its fundamental utilization in various text mining application problems. This paper propose a new method based on classification algorithms for measuring the similarity between two texts. Specifically, a sentence-t... see more


Mausumi Goswami,B.S Purkayastha    

With fast growth in size of digital text documents over internet and digital repositories, the pools of digital document is piling up day by day. Due to this digital revolution and growth, an efficient and effective technique is required to handle such a... see more


Wen Jiang,Yan Yang,Yu Luo,Xiyun Qin    

Dempster-Shafer theory of evidence has been widely used in many data fusion application systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, an im... see more