Professional Documents
Culture Documents
SUPERVISED BY PRESENTED BY
• ABSTRACT
• OBJECTIVE
• INTRODUCTION
• LITERATURE REVIEW
• DESIGN AND METHODOLOGIES
• STANDARDS & POLICIES USED
• IMPLEMENTATION
• TESTING
• RESULTS
• CONCLUSION
• FUTURE ENHANCEMENTS
• REFERENCES
In this paper authour said that, They contrasted the models using all of the 5 kinds of
approaches depending on the range of features used, size and precision of data set.
In this paper authour said that ,Future work will aim to develop a system that can learn
by itself about new types of phishing attacks by adding a more enhanced feature to the
detection process.
• Python Notebook
Software Reqirements
• OS Windows or Linux
• Python IDE : python 2.7.x and above
• Jupyter IDE
• Setup tools and pip to be installed for 3.6 and above
• Language: Python Scripting
Hardware Requirements
• Processor: 2.0 GHz
• RAM: 4GB and Higher 9
• Processor: Intel i3 and above
• Hard Disk: 500GB: Minimum
• ELM is with just one hidden layer. For the ANN to ensure a highperforming learning,
parameters like threshold value, activation and weight function has to possess the
ideal values for the data system needs to be modeled.
• In gradient-based learning strategies, all these parameters are shifted iteratively to get
appropriate worth. Hence, they could be slow and create low-performing outcomes
due to the likelihood of being stuck in local minima.
• In ELM learning processes, differently from ANN that renews its parameters as
gradient-based, input weights are randomly selected while output weights are
analytically calculated.
• As an analytical studying process appreciably reduces both the It increases the
performance ratio.
• So as to trigger the cells from the hidden layer of ELM, a terminal function as well as
non linear (sigmoid, sinus, Gaussian), non-derivable or discrete activation works may
be used.
PRESENTED DATE:03-07-2020
BATCH NO:5
10
• SEQUENCE DIAGRAM
12
BATCH NO:5 PRESENTED DATE:03-07-2020
TESTING
UNIT TESTING
• This testing method believes a module as single unit And tests the machine at
ports and communicates with other modules rather than getting right into
details at invoice level.
• Here the module will probably be medicated as a black box, that’ll need a
while and generate output signal. Outputs for a given set of input combination.
• Here all of the pre tested individual modules will be assembled to make the bigger
tests and system are carried out at platform level to ensure all modules are still
working in synchronous with one another.
• This testing methodology helps in making certain that all modules that are working
flawlessly when checked individually will also be running in cohesion with different
modules.
• For this testing we create test cases to look at all modules once and then generated test
combinations of evaluation avenues through out the system to ensure no course is
making its way into chaos
PRESENTED DATE:03-07-2020 16
BATCH NO:5
• BLACK BOX TESTING
PRESENTED DATE:03-07-2020
BATCH NO:5 17
RESULTS
PRESENTED DATE:03-07-2020
BATCH NO:5 18
BATCH NO:5 PRESENTED DATE:03-07-2020 19
CONCLUSION
We defined features of phishing attack and also we proposed a classification version in
order to classification of those phishing attacks.
This procedure is composed of feature extraction from websites and classification
section. In the feature extractionwe have clearly defined rules of malware feature
extraction and these rules are utilized for receiving features.
In order to classification of those feature, SVM, both NB and also ELM were all used.
At the ELM, 6 distinct activation functions were used and ELM achieved highest
accuracy score
[3] Shraddha Parekh ,Dhwanil Parikh(2018) A new method for Detection of Phishing
Websites. URL Detection978-1-5386-1974-2/18 2018 IEEE952.