Evaluation of Phishing Techniques Based on Machine Learning

  • Unique Paper ID: 153289
  • PageNo: 346-350
  • Abstract:
  • Because of the large number of online transactions that occur each day, spoofing destinations is a big concern for online security challenges. The goal of this project is to create an overview of spoofing. A social attack and its identification, as well as raising awareness among customers who are unaware of this serious assault, as many of them are still caught in the trap. A huge majority of the clients are unaware of the problem, and they unintentionally populate several structures that have a Spoofing site that is hidden. This leads to the disclosure of sensitive information about the person in question. This paper also provides a brief overview of a few AI algorithms for predicting Spoofing locations, including Neural Network and Random Forest calculations. On January 2, 1996-97, the term "spoofing" was first used in the Usenet newsgroup AO-Hell to describe a group of programmers stealing client certifications on Usenet (AOL). Spoofing assaults have risen in scale and complexity since then, causing huge monetary and reputational harm to web-based clients. Spoofing is a type of social engineering attack that takes advantage of a vulnerability in the client's system.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{153289,
        author = {Afreen Begum and Afroze Ansari},
        title = {Evaluation of Phishing Techniques Based on Machine Learning},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {8},
        number = {6},
        pages = {346-350},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=153289},
        abstract = {Because of the large number of online transactions that occur each day, spoofing destinations is a big concern for online security challenges. The goal of this project is to create an overview of spoofing. A social attack and its identification, as well as raising awareness among customers who are unaware of this serious assault, as many of them are still caught in the trap. A huge majority of the clients are unaware of the problem, and they unintentionally populate several structures that have a Spoofing site that is hidden. This leads to the disclosure of sensitive information about the person in question. This paper also provides a brief overview of a few AI algorithms for predicting Spoofing locations, including Neural Network and Random Forest calculations. On January 2, 1996-97, the term "spoofing" was first used in the Usenet newsgroup AO-Hell to describe a group of programmers stealing client certifications on Usenet (AOL). Spoofing assaults have risen in scale and complexity since then, causing huge monetary and reputational harm to web-based clients. Spoofing is a type of social engineering attack that takes advantage of a vulnerability in the client's system.},
        keywords = {},
        month = {},
        }

Cite This Article

Begum, A., & Ansari, A. (). Evaluation of Phishing Techniques Based on Machine Learning. International Journal of Innovative Research in Technology (IJIRT), 8(6), 346–350.

Related Articles