Phishing
Phishing
URL-BASED PHISHING
By
DETECTION 02FE23MCA027 : Ritesh Honule
02FE23MCA040: Rohan Patil
02FE23MCA045: Anish vernekar
02FE23MCA057: Aditya Sankpal
GUIDE :-
1
Introduction
The Internet is essential but enables phishing.
Phishers use fake websites and social engineering to
steal credentials. They constantly evolve to bypass
detection. Machine learning eff ectively identifi es
phishing by recognizing common attack patterns. It
helps diff erentiate between legitimate and malicious
websites.
2
Literature Review
[1] Machine Learning-Based Phishing Detection Using URL
URLs.
[3] Deep Learning for Phishing URL Detection (Deep Learning
Techniques)
• Uses CNNs and transformers to automatically learn phishing
Balancing Techniques)
• Addresses imbalanced datasets using oversampling,
1.
4
Final Problem Defination
Phishing attacks use deceptive URLs to steal sensitive
information, posing a major cybersecurity threat. Traditional
detection methods struggle as attackers constantly evolve
techniques to bypass them. Machine learning can effectively
identify phishing URLs by analyzing patterns and features.
However, challenges like imbalanced datasets, real-time
detection, and accuracy persist. This project aims to develop an
ML-based model for accurate and efficient phishing URL
detection.
5
Software & Hardware
Requirements
Software Requirements:
1. Operating System: Windows 10/11, Linux (Ubuntu), or macOS
Hardware Requirements:
4. P r o c e s s o r : I n te l C ore i 5/ i 7 ( or A MD e q u i v a l e n t ) – Mi n i m u m 2. 5
GHz
5. R A M : 8G B (Mi n i m u m ) , 16G B ( Re c om m e n d e d f or l arg e d at as e t s )
6. St o r ag e : 50G B fre e s p ace ( fo r da ta s e ts , m od e l tr ai n i n g, an d
logs)
7. G P U ( O p ti on al ) : NVIDIA GPU ( f or deep l e arn i n g m od e l s , if
re q u i re d )
6
Software & Hardware
Requirements
Libraries Requirements:
1. NumPy, pandas – Data manipulation
7
Proposed Methodology
• Feature Engineering: Extract key URL features like domain
individual weaknesses.
• Imbalanced Data Handling: Use techniques like oversampling,
data.
• Transfer Learning: Fine-tune pre-trained models on phishing-specific
8
References
1. Machine Learning-Based Phishing Detection Using URL Features -
10