SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 991
Detecting Phishing Websites Using Machine Learning
Adwait Changan1, Vaibhav Mahalle2, Prafull Patil3, Prabuddha Salve4
Department of Information Technology, Sinhgad College of Engineering, Pune, India. 1, 2, 3, 4
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Today's generation is increasingly reliant on
web technology for a variety of tasks such as banking,
communication, and so on. As a result, users can
encounter multiple security threats, with phishing being
one of the most serious and prominent attacks. Phishing
attacks attempt to steal sensitive information from users
by impersonating a legitimate entity. The attacker
employs a phishing attack to obtain the victims'
credentials, such as their bank account number,
passwords, or other sensitive information by
impersonating a genuine website, and the victim is
unaware of the phishing website. So, in this paper, a
system is proposed to detect phishingsitesusingmachine
learning in real-time by utilizing a classifier that is
trained on an exhaustive dataset with enriched features.
Key Words: Phishing, Cyber Security, Random Forest,
Malicious URL detection, Machine learning in Cybersecurity
1. INTRODUCTION
Today, the majority of individual and organizational
communication and interaction takes place via the internet,
and this trend is expected to continue and grow. People are
currently heavily reliant on web technology, and most are
unaware of the cyber threat due to a lack of technical
knowledge. Numerous organizations and businesses have
already been confronted with the threat and problem of
cyber-attacks. Among different types of cyber-attacks
present, Phishing is a significant cyber-attack that
can threatens online users' identities. Phishing attacks
typically involve an attacker who will act as a credible
resource in order to steal sensitive data from victims.
Victims of successful attacks visit phishing websiteswithout
recognising it. Once on the website, users can provide
private information such as passwords or banking-related
sensitive information, and they are also at risk of
downloading malware that the attacker has placed on the
site.
This paper's main objective is to present a technique for
identifying phishing websites. There are approximately five
ways to this problem, including the Blacklisting strategy,the
Rule-based or Heuristics-basedapproach,theContent-based
approach, and the Machine Learningapproach,whichisthen
improved by the Hybridapproach[9].Thesuggestedmethod
uses a model that is trained on the website's contents and
URL-based features to determine if the site is a legitimate
website or a phishing website.
2. LITERATURE SURVEY
1) Mehek Thakera, Mihir Parikhb, Preetika Shettyc Vinit
Neogid, Shree Jaswale(2018)
This paper proposes a system that will detect old and newly
generated phishing URLs using Data Mining. A cloud-based
classifier is developed which takes features of URL as an
input. The model will be deployed using the chrome
extension. The model will be trained with an exhaustive
dataset and uses URL-based and Domain-based Features to
ensure maximum accuracy [1].
2) Srushti Patil, Sudhir Dhage (2019)
A comparative study of the important anti-phishing tools
was completed and their limitations were pointed out. This
paper analyzed the URL-based features used in the past and
improved their definitions as per the current scenario [9].
There is a full implementation of the anti-phishing tool
shown in the paper. Also, the accuracy and observation of
the developed tool are given [9].
3) Ozgur Koray Sahingoz, Ebubekir Buber, Onder Demir,
Banu Diri
In this paper, a real-time anti-phishing system, using seven
different classification algorithms and natural language
processing (NLP) basedfeatures,isproposed[4].Thesystem
has the following distinguishing properties: language
independence, use of a huge size of phishing and legitimate
data, real-time execution, detection of new websites,
independence from third-party services and use of feature-
rich classifiers [4]. New dataset is constructedformeasuring
the performance of the system and the experimental results
are tested on it. According to the experimental results from
the implemented classification algorithms, Random Forest
algorithm with only NLP based features gives the best
performance with the 97.98% accuracy rate for detection of
phishing URLs [4].
4) Dharmaraj R. Patil, and Jayantrao B. Patil (2018)
This paper gives a methodology to detect malicious URLS
and the type of attacks based on multi-class classification.In
this work, they proposed 42 new features of spam, phishing
and malware URLS. These features were not considered in
the earlier studies for phishing URLs detection and attack
types identification [3]. The training data for the developed
tool was created with help of 26041 benign and 23894
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 992
malicious URLs containing 11297 malwares, 8976 phishing
and 3621 spam URLS. Experiments are performed on the
created dataset using machine learning classifiers [3].
5) Doyen Sahoo, Chenghao Liu, Steven C.H. Hoi (2019)
The purpose of this study is to provide a thorough overview
and a structural knowledge of machine learning-based
malicious URL detection methods. They outline the formal
definition of malicious URL detection as a machine learning
challenge, classify, and evaluate the contributions of
literature works that address various aspects of this issue.
Paper offers numerous URL- and content-based capabilities
that can be utilized to improve model training [2].
3. PROPOSED SYSTEM
The suggested system will havea client-serverdesign.Onthe
client side, a chrome extension will be used to send the
Uniform Resource Locator (URL) and Web page source
attribute to the server that the user is presently visiting. A
cloud-based model for phishing site detection will be
constructed on the server side which is trained using
random forest algorithm. [1]
Fig -1: Proposed System Architecture
3.1 Training Dataset:
The dataset needed to train the model should be large, with
two distinct classes: legitimate and phishing. Furthermore,
the dataset should include a balanced mix of legitimate and
phishing sites. Phish Tank will mostly be the source of the
phishing URLs. [5] For legitimate pages, Alexa, Statista, and
Similarweb can be used to get pages with high traffic and
better ranking as these pages will have a verylowpossibility
to be phishing web pages. It is because malicious websites
will have less traffic and lower ranking on search engines
due to their limited life span. As a result, a dataset with
40000 URLs can be formed.
3.2 Feature Selection:
Feature selection is an important process because it has a
large impact on model accuracy in the real world. The
process of selecting the best set of features for model
training is known as feature selection. In proposed system
features used are URL based and Content based features.
3.2.1 : URL based features:
These are features that are obtained from the URL that
which user is currently visiting.
Fig -2: URL Components
1)Protocol check: To check if protocal used is "https".
2)Word count: After parsing URL through special characters
words are counted.
3)Average word length : Average length of words obtained
after parsing.
4)Character count: Total number of characters present in
URL.
5)Digit count: Total number of digits present in URL.
6)Special characters count: Total number of special
characters present in URL.
7)Keyword count: Keywords like login, gift, secure, etc.
count.
8)Brand name count: Keywords like facebook, gmail, etc.
count.
9)Look alike keywords count: Keywords like logiin, seccure,
etc.
10)Look alike brand name count: Keywords like faceb00k,
instagrom.
11)Random words : Words which are not keywords and
brand name.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 993
12)Length of file path : The length calculated for path.
13)Top level domain check: Verify if Top level domain is
most widely used domian like : com, edu, org, etc.
14)Occurance of Subdomian : Occurance of Subdomian are
usually more in malacious site.
3.2.2 : Content based features:
These features can be derived from the source code of the
page which user wants to access. Feature are:
1) Word count: Total number of text words present on web
page.
2) Average word length: Average length of text words
present on web page.
3) Links Count: Total number of links present in web page.
4) Iframe tag count: Total number of Iframe tags present in
web page.
5) Embed tag count: Total number of embed tags present in
web page.
6) Common Phishing word count: Words like pay, bonus,
free, access, log, etc. count.
3.3 Data Pre-processing:
Raw data is transformed into usable formats during data
preprocessing. Decomposers can be used on URLs to split
it and extract the necessary parts in order to obtain
attributes such as brand name, portocol, etc. The most well-
known and frequently used brand names and keywords are
gathered and checked for their presence in URLs. To extract
URL-based features, the URL visited by the user is split into
words using special characters. After that, brand name and
keyword checks are performed on the obtained words. If a
splited word is not found in both dictionaries, it is sent to a
word decomposer, which can split two adjacent words in a
string into two separate words. Word decomposer firstly
creates substrings of the input string passed. Then a
dictonary check is made on the obtained sub stringstoknow
the words present. If it is unable to separate, thentheword’s
similarity to available brand names and keywords is
examined. Still, if there is no similarity,then it is treated as a
random word. Depending on the status of a word under
review appriopriate features are incremented. For content
based feature web crawling can be done to get the value for
the features.
3.4 Classifiers:
With the data set created, multiple classifiers were trained.
The Random Forest algorithm was the most accurate.
Random forests are an ensemble learning method for
Classification, Regression, and other tasks that operate by
constructing a multitude of decision trees at training
time. The trained model will be deployed using cloud
services in the proposed system.
Table -1: Accuracy of Classifiers trained
Classifier Accuracy
Naive Bayes 91.9832
Support Vector Machine 94.5901
Neural Network 96.3394
Random Forest 97.3659
K-Nearest Neighbor 97.1384
4. CONCLUSIONS
Phishing website is one of the challenging securityproblems
faced recently due to the rise of web pages worldwide and
the detection of these websites as legitimate and phishing is
one of the challenging aspects.TheDetectionandPrevention
of Phishing Websites system offers security fortheuser who
can easily fall into a trap due to a lack of awareness or
technical knowledge. So, a system is developed with
enriched Features and a Random Forest classifier is used to
achieve better accuracy. Trained model will be deployed
using cloud services. Onclientside,browser extension which
is a small software module for customizing a web browser
will be used [11]. The extension will send the URL that the
user is attempting to access to a cloud-based feature
extractor, which will then supply the extractedfeaturetothe
model for detection. Furthermore, the classification result
will be updated to an extension to restrict user access to the
page if it is a phishing site.
The proposed system will have advantages:
1. Real-time Execution.
2. Huge Size of Phishing and Legitimate Data.
3. Detection of new Websites
4. Independence from Third-Party Services
5. Use of Enriched Features.
REFERENCES
[1] Mehek Thakera, Mihir Parikhb, Preetika Shettyc, Vinit
Neogid, Shree Jaswale. "Detecting phishing websites using
Data Mining" 2018.
[2] Doyen Sahoo, Chenghao Liu, and Steven C.H. Hoi.
"Malicious URL detection using Machine Leaming:ASurvey"
2019.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 994
[3] Dharmaraj R. Patil, and Jayantrao B.Patil."Feature-based
Malicious URL and Attack Type Detection Using Multi-class
Classification" July 2018, Volume 10, Number 2.
[4] Ozgur Koray Sahingoz, Ebubekir Buber, Onder Demir,
Banu Diri "Machine learning based phishing detection from
URLs" 25 July 2018.
[5] Ebubekir Buber, Banu Diri, and Ozgur Koray Sahingoz.
"NLP based phishingattack detectionfromURLs." November
2007. [6]
[6]Varsharani Hawanna, V. Y. Kulkarni, R. A. Rane. "A novel
algorithm to detect phishing URLs" 2016.
[7] Yu Zhou, Yongzheng Zhang, Jun Xiaon,Yipeng Wang,
Weiyao Lin "Visual similarity based anti-phishing with the
combination of local and global features" 2014.
[8] M. Amaad Ul Haq Tahir, Sohail Asghar, Ayesha Zafar,
Saira Gillani. "Hybrid model to detect phishing sites using
Supervised Learning Algorithms" 2016. [9] Srushti Patil,
Sudhir Dhage. "A Methodical Overview on Phishing
Detection along with an Organized WaytoConstructanAnti-
Phishing Framework" 2019.
[10] Microsoft Contributors. Phishing[online] Available:
https://docs.microsoft.com/en-
us/windows/security/threat-
protection/intelligence/phishing
[11] Wikipedia Contributors. Browser Extension[online]
Available:
https://en.wikipedia.org/wiki/Browser_extension

Weitere ähnliche Inhalte

Ähnlich wie Detecting Phishing Websites Using Machine Learning

IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningIRJET Journal
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONIJNSA Journal
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsIRJET Journal
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection SystemIRJET Journal
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
PHISHING URL DETECTION USING MACHINE LEARNING
PHISHING URL DETECTION USING MACHINE LEARNINGPHISHING URL DETECTION USING MACHINE LEARNING
PHISHING URL DETECTION USING MACHINE LEARNINGIRJET Journal
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET Journal
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningIRJET Journal
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNINGDETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNINGIRJET Journal
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary AlgorithmsIRJET Journal
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONIRJET Journal
 
IRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious WebsitesIRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious WebsitesIRJET Journal
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 

Ähnlich wie Detecting Phishing Websites Using Machine Learning (20)

IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
Malicious Link Detection System
Malicious Link Detection SystemMalicious Link Detection System
Malicious Link Detection System
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
PHISHING URL DETECTION USING MACHINE LEARNING
PHISHING URL DETECTION USING MACHINE LEARNINGPHISHING URL DETECTION USING MACHINE LEARNING
PHISHING URL DETECTION USING MACHINE LEARNING
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
 
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNINGDETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
IRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious WebsitesIRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious Websites
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Detecting Phishing Websites Using Machine Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 991 Detecting Phishing Websites Using Machine Learning Adwait Changan1, Vaibhav Mahalle2, Prafull Patil3, Prabuddha Salve4 Department of Information Technology, Sinhgad College of Engineering, Pune, India. 1, 2, 3, 4 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Today's generation is increasingly reliant on web technology for a variety of tasks such as banking, communication, and so on. As a result, users can encounter multiple security threats, with phishing being one of the most serious and prominent attacks. Phishing attacks attempt to steal sensitive information from users by impersonating a legitimate entity. The attacker employs a phishing attack to obtain the victims' credentials, such as their bank account number, passwords, or other sensitive information by impersonating a genuine website, and the victim is unaware of the phishing website. So, in this paper, a system is proposed to detect phishingsitesusingmachine learning in real-time by utilizing a classifier that is trained on an exhaustive dataset with enriched features. Key Words: Phishing, Cyber Security, Random Forest, Malicious URL detection, Machine learning in Cybersecurity 1. INTRODUCTION Today, the majority of individual and organizational communication and interaction takes place via the internet, and this trend is expected to continue and grow. People are currently heavily reliant on web technology, and most are unaware of the cyber threat due to a lack of technical knowledge. Numerous organizations and businesses have already been confronted with the threat and problem of cyber-attacks. Among different types of cyber-attacks present, Phishing is a significant cyber-attack that can threatens online users' identities. Phishing attacks typically involve an attacker who will act as a credible resource in order to steal sensitive data from victims. Victims of successful attacks visit phishing websiteswithout recognising it. Once on the website, users can provide private information such as passwords or banking-related sensitive information, and they are also at risk of downloading malware that the attacker has placed on the site. This paper's main objective is to present a technique for identifying phishing websites. There are approximately five ways to this problem, including the Blacklisting strategy,the Rule-based or Heuristics-basedapproach,theContent-based approach, and the Machine Learningapproach,whichisthen improved by the Hybridapproach[9].Thesuggestedmethod uses a model that is trained on the website's contents and URL-based features to determine if the site is a legitimate website or a phishing website. 2. LITERATURE SURVEY 1) Mehek Thakera, Mihir Parikhb, Preetika Shettyc Vinit Neogid, Shree Jaswale(2018) This paper proposes a system that will detect old and newly generated phishing URLs using Data Mining. A cloud-based classifier is developed which takes features of URL as an input. The model will be deployed using the chrome extension. The model will be trained with an exhaustive dataset and uses URL-based and Domain-based Features to ensure maximum accuracy [1]. 2) Srushti Patil, Sudhir Dhage (2019) A comparative study of the important anti-phishing tools was completed and their limitations were pointed out. This paper analyzed the URL-based features used in the past and improved their definitions as per the current scenario [9]. There is a full implementation of the anti-phishing tool shown in the paper. Also, the accuracy and observation of the developed tool are given [9]. 3) Ozgur Koray Sahingoz, Ebubekir Buber, Onder Demir, Banu Diri In this paper, a real-time anti-phishing system, using seven different classification algorithms and natural language processing (NLP) basedfeatures,isproposed[4].Thesystem has the following distinguishing properties: language independence, use of a huge size of phishing and legitimate data, real-time execution, detection of new websites, independence from third-party services and use of feature- rich classifiers [4]. New dataset is constructedformeasuring the performance of the system and the experimental results are tested on it. According to the experimental results from the implemented classification algorithms, Random Forest algorithm with only NLP based features gives the best performance with the 97.98% accuracy rate for detection of phishing URLs [4]. 4) Dharmaraj R. Patil, and Jayantrao B. Patil (2018) This paper gives a methodology to detect malicious URLS and the type of attacks based on multi-class classification.In this work, they proposed 42 new features of spam, phishing and malware URLS. These features were not considered in the earlier studies for phishing URLs detection and attack types identification [3]. The training data for the developed tool was created with help of 26041 benign and 23894
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 992 malicious URLs containing 11297 malwares, 8976 phishing and 3621 spam URLS. Experiments are performed on the created dataset using machine learning classifiers [3]. 5) Doyen Sahoo, Chenghao Liu, Steven C.H. Hoi (2019) The purpose of this study is to provide a thorough overview and a structural knowledge of machine learning-based malicious URL detection methods. They outline the formal definition of malicious URL detection as a machine learning challenge, classify, and evaluate the contributions of literature works that address various aspects of this issue. Paper offers numerous URL- and content-based capabilities that can be utilized to improve model training [2]. 3. PROPOSED SYSTEM The suggested system will havea client-serverdesign.Onthe client side, a chrome extension will be used to send the Uniform Resource Locator (URL) and Web page source attribute to the server that the user is presently visiting. A cloud-based model for phishing site detection will be constructed on the server side which is trained using random forest algorithm. [1] Fig -1: Proposed System Architecture 3.1 Training Dataset: The dataset needed to train the model should be large, with two distinct classes: legitimate and phishing. Furthermore, the dataset should include a balanced mix of legitimate and phishing sites. Phish Tank will mostly be the source of the phishing URLs. [5] For legitimate pages, Alexa, Statista, and Similarweb can be used to get pages with high traffic and better ranking as these pages will have a verylowpossibility to be phishing web pages. It is because malicious websites will have less traffic and lower ranking on search engines due to their limited life span. As a result, a dataset with 40000 URLs can be formed. 3.2 Feature Selection: Feature selection is an important process because it has a large impact on model accuracy in the real world. The process of selecting the best set of features for model training is known as feature selection. In proposed system features used are URL based and Content based features. 3.2.1 : URL based features: These are features that are obtained from the URL that which user is currently visiting. Fig -2: URL Components 1)Protocol check: To check if protocal used is "https". 2)Word count: After parsing URL through special characters words are counted. 3)Average word length : Average length of words obtained after parsing. 4)Character count: Total number of characters present in URL. 5)Digit count: Total number of digits present in URL. 6)Special characters count: Total number of special characters present in URL. 7)Keyword count: Keywords like login, gift, secure, etc. count. 8)Brand name count: Keywords like facebook, gmail, etc. count. 9)Look alike keywords count: Keywords like logiin, seccure, etc. 10)Look alike brand name count: Keywords like faceb00k, instagrom. 11)Random words : Words which are not keywords and brand name.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 993 12)Length of file path : The length calculated for path. 13)Top level domain check: Verify if Top level domain is most widely used domian like : com, edu, org, etc. 14)Occurance of Subdomian : Occurance of Subdomian are usually more in malacious site. 3.2.2 : Content based features: These features can be derived from the source code of the page which user wants to access. Feature are: 1) Word count: Total number of text words present on web page. 2) Average word length: Average length of text words present on web page. 3) Links Count: Total number of links present in web page. 4) Iframe tag count: Total number of Iframe tags present in web page. 5) Embed tag count: Total number of embed tags present in web page. 6) Common Phishing word count: Words like pay, bonus, free, access, log, etc. count. 3.3 Data Pre-processing: Raw data is transformed into usable formats during data preprocessing. Decomposers can be used on URLs to split it and extract the necessary parts in order to obtain attributes such as brand name, portocol, etc. The most well- known and frequently used brand names and keywords are gathered and checked for their presence in URLs. To extract URL-based features, the URL visited by the user is split into words using special characters. After that, brand name and keyword checks are performed on the obtained words. If a splited word is not found in both dictionaries, it is sent to a word decomposer, which can split two adjacent words in a string into two separate words. Word decomposer firstly creates substrings of the input string passed. Then a dictonary check is made on the obtained sub stringstoknow the words present. If it is unable to separate, thentheword’s similarity to available brand names and keywords is examined. Still, if there is no similarity,then it is treated as a random word. Depending on the status of a word under review appriopriate features are incremented. For content based feature web crawling can be done to get the value for the features. 3.4 Classifiers: With the data set created, multiple classifiers were trained. The Random Forest algorithm was the most accurate. Random forests are an ensemble learning method for Classification, Regression, and other tasks that operate by constructing a multitude of decision trees at training time. The trained model will be deployed using cloud services in the proposed system. Table -1: Accuracy of Classifiers trained Classifier Accuracy Naive Bayes 91.9832 Support Vector Machine 94.5901 Neural Network 96.3394 Random Forest 97.3659 K-Nearest Neighbor 97.1384 4. CONCLUSIONS Phishing website is one of the challenging securityproblems faced recently due to the rise of web pages worldwide and the detection of these websites as legitimate and phishing is one of the challenging aspects.TheDetectionandPrevention of Phishing Websites system offers security fortheuser who can easily fall into a trap due to a lack of awareness or technical knowledge. So, a system is developed with enriched Features and a Random Forest classifier is used to achieve better accuracy. Trained model will be deployed using cloud services. Onclientside,browser extension which is a small software module for customizing a web browser will be used [11]. The extension will send the URL that the user is attempting to access to a cloud-based feature extractor, which will then supply the extractedfeaturetothe model for detection. Furthermore, the classification result will be updated to an extension to restrict user access to the page if it is a phishing site. The proposed system will have advantages: 1. Real-time Execution. 2. Huge Size of Phishing and Legitimate Data. 3. Detection of new Websites 4. Independence from Third-Party Services 5. Use of Enriched Features. REFERENCES [1] Mehek Thakera, Mihir Parikhb, Preetika Shettyc, Vinit Neogid, Shree Jaswale. "Detecting phishing websites using Data Mining" 2018. [2] Doyen Sahoo, Chenghao Liu, and Steven C.H. Hoi. "Malicious URL detection using Machine Leaming:ASurvey" 2019.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 994 [3] Dharmaraj R. Patil, and Jayantrao B.Patil."Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification" July 2018, Volume 10, Number 2. [4] Ozgur Koray Sahingoz, Ebubekir Buber, Onder Demir, Banu Diri "Machine learning based phishing detection from URLs" 25 July 2018. [5] Ebubekir Buber, Banu Diri, and Ozgur Koray Sahingoz. "NLP based phishingattack detectionfromURLs." November 2007. [6] [6]Varsharani Hawanna, V. Y. Kulkarni, R. A. Rane. "A novel algorithm to detect phishing URLs" 2016. [7] Yu Zhou, Yongzheng Zhang, Jun Xiaon,Yipeng Wang, Weiyao Lin "Visual similarity based anti-phishing with the combination of local and global features" 2014. [8] M. Amaad Ul Haq Tahir, Sohail Asghar, Ayesha Zafar, Saira Gillani. "Hybrid model to detect phishing sites using Supervised Learning Algorithms" 2016. [9] Srushti Patil, Sudhir Dhage. "A Methodical Overview on Phishing Detection along with an Organized WaytoConstructanAnti- Phishing Framework" 2019. [10] Microsoft Contributors. Phishing[online] Available: https://docs.microsoft.com/en- us/windows/security/threat- protection/intelligence/phishing [11] Wikipedia Contributors. Browser Extension[online] Available: https://en.wikipedia.org/wiki/Browser_extension