A Phishing detection model based on dynamic-hybrid feature selection
dc.contributor.author | Ruiru, Daniel K | |
dc.date.accessioned | 2021-07-28T12:56:40Z | |
dc.date.available | 2021-07-28T12:56:40Z | |
dc.date.issued | 2019-07 | |
dc.description | Thesis Submitted to the Faculty of Information in partial fulfillment of the requirements for the award of Master of Science in Information Technology | en_US |
dc.description.abstract | Phishing attacks have been a big internet nuisance since the early 1990s when hackers started stealing information from organizations using messaging platforms. At the time, the problem affected large institutions and corporations as the internet was still in its early stages of development and, had minimal individual subscribers. The early 2000s saw the widespread application of the technology (internet) which subsequently saw phishers target individual users using electronic mails (emails). In itself, phishing is a form of cyber-attack that steals personal information from unsuspecting users by duping them using verification or reward emails. This deception process ultimately helps the intruders to access sensitive data that can be used to access financial records for monetary gains or identity theft. Phishing attacks are so prevalent today that over 95 percent of all cyber-attacks are characterized by their intrusion procedures. Moreover, the attacks seem to increase each year and based on recent surveys are said to have a 60 percent annual growth rate. It is because of this outcome that this research proposes a predictive model to detect phishing attacks by implementing a system that pre-empts the intrusion processes before they happen. Unlike conventional methods that rely on human expertise to mitigate the problem, the proposed model automates the identification of the attacks and subsequently their control. This research aims to achieve this goal by optimizing the selection of subset features using a dynamic model that analyses the structural properties of phishing attacks to get adaptive attributes (features) for detecting phishing threats (as highlighted in chapter 4). Random forest is then used as the final classifier owing to its accuracy results (84.13%). Ultimately, the study then proposes the construction of a base model for bootstrapping other detection models in the cyber-security world. | en_US |
dc.description.sponsorship | Faculty of Information Technology | en_US |
dc.identifier.uri | http://hdl.handle.net/11071/12052 | |
dc.language.iso | en_US | en_US |
dc.publisher | Strathmore University | en_US |
dc.subject | Phishers | en_US |
dc.subject | Phishing attacks | en_US |
dc.subject | Neural Networks | en_US |
dc.subject | Uniform Resource Locator | en_US |
dc.title | A Phishing detection model based on dynamic-hybrid feature selection | en_US |
dc.type | Thesis | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- A Phishing detection model based on dynamic-hybrid feature selection.pdf
- Size:
- 1.4 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full-text thesis
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: