Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355318
Bilgehan Arslan, Mehtap Ulker, S. Akleylek, Ş. Sağiroğlu
In the computer based solutions of the problems in today's world; if the problem has a high complexity value, different requirements can be addressed such as necessity of simultaneous operation of many computers, the long processing times for the operation of algorithms, and computers with hardware features that can provide high performance. For this reason, it is inevitable to use a computer based on quantum physics in the near future in order to make today's cryptosystems unsafe, search the servers and other information storage centers on internet very quickly, solve optimization problems in the NP-hard category with a very wide solution space and analyze information on large-scale data processing and to process high-resolution image for artificial intelligence applications. In this study, an examination of quantum approaches and quantum computers, which will be widely used in the near future, was carried out and the areas in which such innovation can be used was evaluated. Malicious or non-malicious use of quantum computers with this capacity, the advantages and disadvantages of the high performance which it provides were examined under the head of security, the effect of this recent technology on the existing security systems was investigated.
{"title":"A study on the use of quantum computers, risk assessment and security problems","authors":"Bilgehan Arslan, Mehtap Ulker, S. Akleylek, Ş. Sağiroğlu","doi":"10.1109/ISDFS.2018.8355318","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355318","url":null,"abstract":"In the computer based solutions of the problems in today's world; if the problem has a high complexity value, different requirements can be addressed such as necessity of simultaneous operation of many computers, the long processing times for the operation of algorithms, and computers with hardware features that can provide high performance. For this reason, it is inevitable to use a computer based on quantum physics in the near future in order to make today's cryptosystems unsafe, search the servers and other information storage centers on internet very quickly, solve optimization problems in the NP-hard category with a very wide solution space and analyze information on large-scale data processing and to process high-resolution image for artificial intelligence applications. In this study, an examination of quantum approaches and quantum computers, which will be widely used in the near future, was carried out and the areas in which such innovation can be used was evaluated. Malicious or non-malicious use of quantum computers with this capacity, the advantages and disadvantages of the high performance which it provides were examined under the head of security, the effect of this recent technology on the existing security systems was investigated.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355315
Abdullah O. Abdullah, M. A. Ali, M. Karabatak, A. Şengur
Ever since its development in 2005, YouTube has been providing a vital social media platform for video sharing. Unfortunately, YouTube users may have malicious intentions, such as disseminating malware and profanity. One way to do so is using the comment field for this purpose. Although YouTube provides a built-in tool for spam control, yet it is insufficient for combating malicious and spam contents within the comments. In this paper, a comparative study of the common filtering techniques used for YouTube comment spam is conducted. The study deploys datasets extracted from YouTube using its Data API. According to the obtained results, high filtering accuracy (more than 98%) can be achieved with low-complexity algorithms, implying the possibility of developing a suitable browser extension to alleviate comment spam on YouTube in future.
{"title":"A comparative analysis of common YouTube comment spam filtering techniques","authors":"Abdullah O. Abdullah, M. A. Ali, M. Karabatak, A. Şengur","doi":"10.1109/ISDFS.2018.8355315","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355315","url":null,"abstract":"Ever since its development in 2005, YouTube has been providing a vital social media platform for video sharing. Unfortunately, YouTube users may have malicious intentions, such as disseminating malware and profanity. One way to do so is using the comment field for this purpose. Although YouTube provides a built-in tool for spam control, yet it is insufficient for combating malicious and spam contents within the comments. In this paper, a comparative study of the common filtering techniques used for YouTube comment spam is conducted. The study deploys datasets extracted from YouTube using its Data API. According to the obtained results, high filtering accuracy (more than 98%) can be achieved with low-complexity algorithms, implying the possibility of developing a suitable browser extension to alleviate comment spam on YouTube in future.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355386
Songül Karabatak, A. Namli, M. Karabatak
The aim of this study is to reveal the perceptions of high school students regarding cyberbullying through metaphor analysis. The research data were obtained from 67 high school students in Elazığ Province during the academic year of 2017–2018. Qualitative research method was used in the study. In order to collect data students were asked to complete the prompt “Cyberbullying is like … Because …”. Both content and descriptive analysis techniques were utilized to analyze the data. In the analysis of the collected data, participants produced 46 valid metaphors about cyberbullying. Based on these metaphorical images, 10 categories were identified. According to findings most of the high school students had negative opinions about cyber bullying but very few of them also had positive opinions about cyberbullying such as pleasure source. At the end of the study, suggestions have been developed for school administrators, teachers and student about coping with cyberbulling.
{"title":"Perceptions of high school students regarding cyberbullying and precautions on coping with cyberbullying","authors":"Songül Karabatak, A. Namli, M. Karabatak","doi":"10.1109/ISDFS.2018.8355386","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355386","url":null,"abstract":"The aim of this study is to reveal the perceptions of high school students regarding cyberbullying through metaphor analysis. The research data were obtained from 67 high school students in Elazığ Province during the academic year of 2017–2018. Qualitative research method was used in the study. In order to collect data students were asked to complete the prompt “Cyberbullying is like … Because …”. Both content and descriptive analysis techniques were utilized to analyze the data. In the analysis of the collected data, participants produced 46 valid metaphors about cyberbullying. Based on these metaphorical images, 10 categories were identified. According to findings most of the high school students had negative opinions about cyber bullying but very few of them also had positive opinions about cyberbullying such as pleasure source. At the end of the study, suggestions have been developed for school administrators, teachers and student about coping with cyberbulling.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355339
M. Baykara, Ugur Gurturk, Resul Das
Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.
{"title":"An overview of monitoring tools for real-time cyber-attacks","authors":"M. Baykara, Ugur Gurturk, Resul Das","doi":"10.1109/ISDFS.2018.8355339","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355339","url":null,"abstract":"Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355343
Naveed Ahmed, A. Varol
Everyone in this world has a unique set of fingerprints and these fingerprints do not change throughout one's life, and is not questionable. The question is whether investigators can accurately link the collected fingerprints to the offender. Our proposed method can be used to match partial fingerprints with collection of fingerprints of all known criminals and suspects. In this method system completely relies on localized features (minutiae) for registration and matching process. Due to localized in nature minutiae are invariant to translation, rotation and displacement. Errors in alignment lead to errors in matching process.
{"title":"Minutiae based partial fingerprint registration and matching method","authors":"Naveed Ahmed, A. Varol","doi":"10.1109/ISDFS.2018.8355343","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355343","url":null,"abstract":"Everyone in this world has a unique set of fingerprints and these fingerprints do not change throughout one's life, and is not questionable. The question is whether investigators can accurately link the collected fingerprints to the offender. Our proposed method can be used to match partial fingerprints with collection of fingerprints of all known criminals and suspects. In this method system completely relies on localized features (minutiae) for registration and matching process. Due to localized in nature minutiae are invariant to translation, rotation and displacement. Errors in alignment lead to errors in matching process.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115724034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355317
M. Baykara, Baran Sekin
It is vital to protect the files and data for institutions, organizations and individuals. For this, people and institutions develop methods to provide both physical and digital security, and they spend thousands of dollars over the years for measures. Ransomware is undoubtedly one of the most frequently encountered malicious software that harms people and organizations. These viruses are used to encrypt all important data on the infected computer. Ransomware usually targets file types such as PDF, Word, Excel that can store important documents, bills, financial data, and makes these documents inaccessible by encrypting them. The restoration of these encrypted files is only possible with the keyword in the hand of the person who wrote the virus. This key word is given by an aggressive fee, which means ransom against documents. These fees are usually very high and there is no guarantee that the attacker will not want more fee. In this paper, it is aimed to find solutions to these problems and to minimize possible harm. In order to do so, an area called safezone has been created and prevented from being replaced by other software by moving important documents to this zone.
{"title":"A novel approach to ransomware: Designing a safe zone system","authors":"M. Baykara, Baran Sekin","doi":"10.1109/ISDFS.2018.8355317","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355317","url":null,"abstract":"It is vital to protect the files and data for institutions, organizations and individuals. For this, people and institutions develop methods to provide both physical and digital security, and they spend thousands of dollars over the years for measures. Ransomware is undoubtedly one of the most frequently encountered malicious software that harms people and organizations. These viruses are used to encrypt all important data on the infected computer. Ransomware usually targets file types such as PDF, Word, Excel that can store important documents, bills, financial data, and makes these documents inaccessible by encrypting them. The restoration of these encrypted files is only possible with the keyword in the hand of the person who wrote the virus. This key word is given by an aggressive fee, which means ransom against documents. These fees are usually very high and there is no guarantee that the attacker will not want more fee. In this paper, it is aimed to find solutions to these problems and to minimize possible harm. In order to do so, an area called safezone has been created and prevented from being replaced by other software by moving important documents to this zone.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355331
Aliya Tabassum, Mohammad Saleh Mustafa, S. A. Maadeed
Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless communication and extensive usage of cyberspace has weakened privacy. Eventually, cybercrime has become the substantial threat to all the organizations in the world because of its devastating implications on diverse sectors associated to human. This paper explores few impacts of cybercrime to understand the intensity of damage it can cause. Besides, Qatar is taken as a case study to emphasize the exigency of securing cyberspace. The contribution of this work identifies the past cyber-attacks in Qatar to generate consciousness and to trigger actions for improving national security. The recent major cyber-attack on Qatar News Agency which led to catastrophic results and threatened Qatar's diplomacy is also outlined along with the critical challenges that are being faced by the security of Qatar. As cybercrime crosses borders of all nations, this paper emphasizes the need for global response to curb it. Additionally, it delineates the fact that attacks in cyberspace are not just driven by financial gain, but by politics or disinformation to denigrate and cause emotional harm.
{"title":"The need for a global response against cybercrime: Qatar as a case study","authors":"Aliya Tabassum, Mohammad Saleh Mustafa, S. A. Maadeed","doi":"10.1109/ISDFS.2018.8355331","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355331","url":null,"abstract":"Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless communication and extensive usage of cyberspace has weakened privacy. Eventually, cybercrime has become the substantial threat to all the organizations in the world because of its devastating implications on diverse sectors associated to human. This paper explores few impacts of cybercrime to understand the intensity of damage it can cause. Besides, Qatar is taken as a case study to emphasize the exigency of securing cyberspace. The contribution of this work identifies the past cyber-attacks in Qatar to generate consciousness and to trigger actions for improving national security. The recent major cyber-attack on Qatar News Agency which led to catastrophic results and threatened Qatar's diplomacy is also outlined along with the critical challenges that are being faced by the security of Qatar. As cybercrime crosses borders of all nations, this paper emphasizes the need for global response to curb it. Additionally, it delineates the fact that attacks in cyberspace are not just driven by financial gain, but by politics or disinformation to denigrate and cause emotional harm.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355314
Di Wang, Liji Wu, Xiangmin Zhang, Xingjun Wu
Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security. In this work, we designed a novel counter-type Hardware Trojan based on One-hot code, which has better performance than classic solutions. By improvement in this work, the dynamic power consumption of counter Trojan has reached a decrease of 25%. At the same time, power consumption peak caused by flipping like 0111111→1000000 under binary encoding was avoided. The performance of designed Trojan has been fully tested in the software-hardware co-verification environment, which shows that Trojan implantation did not influence the proper work of background circuit, only did some tricks in the way we need; and the Trojan latent period is controllable by connecting Trojan circuit to different trigger nodes.
{"title":"A novel hardware Trojan design based on one-hot code","authors":"Di Wang, Liji Wu, Xiangmin Zhang, Xingjun Wu","doi":"10.1109/ISDFS.2018.8355314","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355314","url":null,"abstract":"Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security. In this work, we designed a novel counter-type Hardware Trojan based on One-hot code, which has better performance than classic solutions. By improvement in this work, the dynamic power consumption of counter Trojan has reached a decrease of 25%. At the same time, power consumption peak caused by flipping like 0111111→1000000 under binary encoding was avoided. The performance of designed Trojan has been fully tested in the software-hardware co-verification environment, which shows that Trojan implantation did not influence the proper work of background circuit, only did some tricks in the way we need; and the Trojan latent period is controllable by connecting Trojan circuit to different trigger nodes.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355368
F. Özkaynak, Mukhlis I. Muhamad
The DES algorithm is an important encryption protocol that has influenced many cryptology studies. It is still used today in many practical applications such as electronic passport. But it is an important problem that the design parameters of substitution boxes of this algorithm are unknown. In this work, we have proposed alternatives to DES s-box structures to solve this problem. The analysis results of the proposed structures are equivalent to DES s-box structures.
{"title":"Alternative substitutional box structures for DES","authors":"F. Özkaynak, Mukhlis I. Muhamad","doi":"10.1109/ISDFS.2018.8355368","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355368","url":null,"abstract":"The DES algorithm is an important encryption protocol that has influenced many cryptology studies. It is still used today in many practical applications such as electronic passport. But it is an important problem that the design parameters of substitution boxes of this algorithm are unknown. In this work, we have proposed alternatives to DES s-box structures to solve this problem. The analysis results of the proposed structures are equivalent to DES s-box structures.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355357
M. Karabatak, Twana Mustafa
The Internet is becoming a necessary and important tool in everyday life. However, Internet users might have poor security for different kinds of web threats, which may lead to financial loss or clients lacking trust in online trading and banking. Phishing is described as a skill of impersonating a trusted website aiming to obtain private and secret information such as a username and password or social security and credit card number. In this paper, phising website dataset taken from UCI was investigated. Its dimension was reduced and the performance comparison of classification algorithms is studied on reduced phishing website dataset. Phishing website dataset was taken from UCI machine learning repository. This dataset consists of 11055 records and 31 features. Feature selection algorithms were applied to reduce the dimension of phishing website dataset and to obtain higher classification performance. Then, the performance of classification algorithms is compared to other data mining classification algorithms. Finally, a comparative classification performance on the reduced dataset by using the common classification algorithms is given.
{"title":"Performance comparison of classifiers on reduced phishing website dataset","authors":"M. Karabatak, Twana Mustafa","doi":"10.1109/ISDFS.2018.8355357","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355357","url":null,"abstract":"The Internet is becoming a necessary and important tool in everyday life. However, Internet users might have poor security for different kinds of web threats, which may lead to financial loss or clients lacking trust in online trading and banking. Phishing is described as a skill of impersonating a trusted website aiming to obtain private and secret information such as a username and password or social security and credit card number. In this paper, phising website dataset taken from UCI was investigated. Its dimension was reduced and the performance comparison of classification algorithms is studied on reduced phishing website dataset. Phishing website dataset was taken from UCI machine learning repository. This dataset consists of 11055 records and 31 features. Feature selection algorithms were applied to reduce the dimension of phishing website dataset and to obtain higher classification performance. Then, the performance of classification algorithms is compared to other data mining classification algorithms. Finally, a comparative classification performance on the reduced dataset by using the common classification algorithms is given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132936515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}