A Fuzzy Rough Set Theory based Feature Selection for Phishing Attack Classification

T. Illakiya, Ajay Rana, Karan Kapoor and Anurag Thakur

With the rapid development of web application, internet user make use of this benefit to a superb amount that they create most of their day to day actions like newspaper reading, shopping, electricity bill payment, ticket booking and leisure with the assistance of the web. This happening enlarge the probability of the users to urge fascinated within the web of spoofing – assaults crafted by hackers to obtain insightful data by charming the user with profitable offer originally then redirect them to a deceptive website. Though numerous tools and methodologies are urbanized to bring to an end phishing and to aware users vocally and visually. In spite this the victory conversion rates of the phishing assault leftovers elevated and also the approach associated with phishing finding suffer tall false positive and negative ratio. During this proposed system a fuzzy rough set theory based system is approached to classify phishing attack.

Volume 12 | 04-Special Issue

Pages: 298-306

DOI: 10.5373/JARDCS/V12SP4/20201492