ANGGRAINI, AYU and Setiawan, Deris (2022) PENENTUAN LEGITIMATE SITE DAN PHISING SITE DENGAN MENGGUNAKAN RULE BASED APPROACH DETECTION BERBASIS URL DAN HTML FEATURES. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011381621080.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011381621080_TURNITIN.pdf - Accepted Version Restricted to Registered users only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Preview |
Text
RAMA_56201_09011381621080_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) | Preview |
Text
RAMA_56201_09011381621080_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (227kB) | Request a copy |
|
Text
RAMA_56201_09011381621080_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (287kB) | Request a copy |
|
Text
RAMA_56201_09011381621080_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (397kB) | Request a copy |
|
Text
RAMA_56201_09011381621080_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (116kB) | Request a copy |
|
Text
RAMA_56201_09011381621080_0003047905_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (90kB) | Request a copy |
|
Preview |
Text
RAMA_56201_09011381621080_0003047905_Lamp.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (2MB) | Preview |
Abstract
Phishing is described as a form of fraud carried out to steal important information, such as passwords, personal data or even credit card and online banking data. And of course this will cause significant losses for the victims ranging from financial losses to data loss. In this study, we will use a rule base approach because the detection process for phishing attacks is simple and easy to use to determine whether the web or link is a legitimate site or a phishing site and by using URLs and HTML features.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Phishing, Rule–Based Approach, URL, HTML Features, Phishing Site, Legitimate Site. |
Subjects: | Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation. T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Ayu Anggraini |
Date Deposited: | 03 Oct 2022 04:10 |
Last Modified: | 17 Mar 2023 05:55 |
URI: | http://repository.unsri.ac.id/id/eprint/79989 |
Actions (login required)
View Item |