The Hacker Eye

Authors

  • Nilesh Khodifad Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author https://orcid.org/0009-0008-4459-5217 (unauthenticated)
  • Akruti Pandwal Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author
  • Bhavesh Atulbahi Vaghela Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author
  • Syed Ibad Ali Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author
  • Sumersing Dayaram Patil Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author
  • Kush Bhushanwar Parul Institute of Engineering and Technology, Parul University Vadodara (Gujarat)- 391760 Author

Keywords:

AdaBoost, Gradient Boosting, Hybrid Module Evaluation, Random Forest, SVM, Voting classifier, XGBoost

Abstract

As hacker eye is a concept of significant risk to internet safety, hacker eye tries to deprive gullible consumers of private information. Phishing websites are the threat that researchers are trying to fight and various techniques in detecting phishing websites have been developed such as machine learning algorithms. Many phishing and legitimate websites can be applied to machine learning algorithm training to learn patterns and characteristics of sites to identify which are phishing and which are not. Once identified and blocked, these algorithms can then be used to find and prey on phishing Web sites, while users are still unscathed. A machine learning approach to detecting Hacker Eye website phishing websites is feature extraction where, through a set of features regarding a website such as URL structure, domain age, content, the ideas around these features are used for identifying such websites. Using deep learning algorithms to automatically extract features and identify intricate patterns in the company's website data is the alternative strategy. Overall machine learning based phishing website detection techniques are promising since such techniques are able to obtain accuracies that rival or even surpass rule based methods. However, and with further research and development, these techniques could become a powerful weapon in the arsenal of anyone fighting against online phishing attacks.

Downloads

Download data is not yet available.

Downloads

Published

31.12.2024

How to Cite

The Hacker Eye. (2024). International Journal of Multidisciplinary Global Research, 1(4), 86-99. https://ijmgr.igrf.co.in/index.php/ijmgr/article/view/6

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)