000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240319085722.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240319b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
23055 |
Author |
Gopal, S. B. |
245 ## - TITLE STATEMENT |
Title |
Autoencoder-based architecture for identification and mitigating phishing URL attack in IoT using DNN |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.104(4), Dec |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
USA |
Name of publisher, distributor, etc. |
Springer |
Year |
2023 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
1227-1240p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and financial details. At least two-thirds of persons were hit by these phishing assaults in 2016, according to a survey (Gopal et al. in IOP Conference Series: Materials Science and Engineering, vol. 1055, no. 1, p. 012072. IOP Publishing ). Therefore, these attacks must be addressed carefully to prevent financial losses. In order to detect and prevent new kinds of assault, in addition to the ones already in use, a defense mechanism that can learn the possibilities of attacks is required. In the IoT (Internet of Things), everything is managed remotely via a web address (URL). So, intruders can simply gain access to the controls by stealing the URL used to access them from a distant location. To identify and prevent access to phishing sites at the network layer, we offer an approach that combines a deep neural networks (DNN) model with autoencoders. In order to train the model for feature reduction, an autoencoder sends it a dataset that includes both legitimate and phishing domains to analyze. The effectiveness of the suggested approach has been tested on a number of datasets, including Open phish, UCI, Mendeley, and PhishTank. For the multiclassification dataset, these metrics for this design are: 92.89% accuracy, 93.07% recall, 92.75% precision, and 92.21% F1-score. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4642 |
Topical term or geographic name entry element |
Humanities and Applied Sciences |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
23056 |
Co-Author |
Poongodi, C. |
773 0# - HOST ITEM ENTRY |
Title |
Journal of the institution of engineers (India): Series B |
International Standard Serial Number |
2250-2106 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
https://link.springer.com/article/10.1007/s40031-023-00934-8 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |