Work place: Al-Azhar University, Faculty of Science (Girl’s branch), Mathematics Department, Cairo, 11754, Egypt
Research Interests: Computer Science & Information Technology, Mathematics of Computing
Aya S. Noah has completed her Bachelor of Science (BSc) in Computer Science & Pure Mathematics at Faculty of Science, Al-Azhar University, Cairo, Egypt, in 2019 with V. Good grade. She can be contacted at email: AyaNoah41167@azhar.edu.eg.
DOI: https://doi.org/10.5815/ijmecs.2023.05.04, Pub. Date: 8 Oct. 2023
There has been a significant rise in internet usage in recent years, which has led to the presence of data theft and the diversity of counterfeit materials. This has resulted the proliferation of cybercrimes and the theft of personal data via social media, e-mail, and phishing websites that are similar to the websites commonly used to grab user data details like that of a credit card or login ID. Phishing, a prevalent form of cybercrime, poses a danger to online security through the theft of personal information, and with the emergence of the COVID-19 virus, which has led to people and organizations being drawn towards the Internet and many people and companies being forced to work remotely, it has led to an increase in the existing phishing threats. Previously, hackers took advantage of the situation to infiltrate the devices of people and companies in numerous ways, which caused huge financial losses and damage to organizations. Based on previous results and research, Machine Learning (ML) is selected by researchers as an efficient method for identifying malicious software web pages from original web pages. This paper presents 30 characteristics of websites, which are analyzed using a correlation matrix to determine the relationship between variables. Feature selection is performed through a wrapper method and Extra Tree Classifiers (ETC) to identify the top-ranked characteristics (Features) for website classification. To evaluate web pages, various machine learning techniques such as Random Forest Tree (RF), Multilayer Perceptron (MLP), Decision Tree (DT), and Support Vector Machine (SVM) are used. The results of monitoring indicate that MLP, a deep neural network, outperforms all other techniques in terms of performance.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals