UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 4
April-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2404H03


Registration ID:
539073

Page Number

q16-q23

Share This Article


Jetir RMS

Title

Detecting Phishing, Keystroke and Keylogger Attacks on Computing Resources

Abstract

Cybersecurity attacks are growing both in frequency and sophistication over the years. This increasing sophistication and complexity call for more advancement and continuous innovation in defensive strategies. Traditional methods of intrusion detection and deep packet inspection, while still largely used and recommended, are no longer sufficient to meet the demands of growing security threats. As computing power increases and cost drops, Machine Learning is seen as an alternative method or an additional mechanism to defend against malwares, botnets, and other attacks. This paper explores Machine Learning as a viable solution by examining its capabilities to classify malicious websites as well as detecting keyloggers in a network. First, a strong data analysis is performed resulting in multiple extracted features from the initial datasets. All these features are then compared with one another through a feature selection process. Then, our approach analyzes machine learning algorithms against a dataset containing common characteristics. By leaving your computer unlocked while you are away for seconds can give hackers all the time, they need to obtain your personal information from your computer.

Key Words

Machine learning, Phishing attack, Keystroke, Keylogger.

Cite This Article

"Detecting Phishing, Keystroke and Keylogger Attacks on Computing Resources ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 4, page no.q16-q23, April-2024, Available :http://www.jetir.org/papers/JETIR2404H03.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Detecting Phishing, Keystroke and Keylogger Attacks on Computing Resources ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 4, page no. ppq16-q23, April-2024, Available at : http://www.jetir.org/papers/JETIR2404H03.pdf

Publication Details

Published Paper ID: JETIR2404H03
Registration ID: 539073
Published In: Volume 11 | Issue 4 | Year April-2024
DOI (Digital Object Identifier): http://doi.one/10.1729/Journal.39209
Page No: q16-q23
Country: Associate Professor, MAHARASHTRA, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00072

Print This Page

Current Call For Paper

Jetir RMS