Presentation Slides
Presentation Slides
MACHINE LEARNING
BY
01 02 03
04 05 06
SCOPE
OF SIGNIFICANC METHODOLOGY
STUDY E OF STUDY
PRESENTATION OUTLINE
07 08 09
LITERATURE EXISTING AND BENEFIT OF
REVIEW PROPOSED PROPOSED
SYSTEM SYSTEM
PRESENTATION OUTLINE
REFERENCE
10 11 12
SYSTEM DESIGN IMPLEMENTATION
& CONCLUSION
(Diagram)
CONTRIBUTION TO
KNOWLEDGE
INTRODUCTION
The Internet global connectivity is regarded as a
crossroads where users can meet and share
information. This is the primary reason phishers
choose this method of data exchange as a point
of contact to conduct widespread phishing
attacks by infecting computers with spyware that
directs people to bogus websites.
Data Collection
METHODOLOGY
These models are selected after different comparison based performance of multiple
machine learning algorithms. Each of these models is trained and tested on a website
content-based feature, extracted from both phishing and legitimate dataset.
Hence, the model with the highest accuracy is selected and integrated to a web application
that will enable a user to predict if a URL link is phishing or legitimate
BENEFIT OF PROPOSED SYSTEM
I. Will be able to differentiate between phishing(0) and legitimate(1) URLs