International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 2 April 2020
ISSN NO 2582-0958
_________________________________________________________________________________________________________________________________
www.trendytechjournals.com
8
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR
CLOUD COMPUTING
B.Bhagavathy Preetha1
, A.B.Harsha Vardhni1
, M.Monica1
Dr.R.Geetha2
UG Students1
, Professor2
,Department of Computer Science and Engineering
S.A.Engineering College, Chennai – 77.
1616003@saec.ac.ina)
, 1616010@saec.ac.inb)
, 1616023@saec.ac.inc)
ABSTRACT
Typically an IDS refers to a software application that monitors a network for intrusion or malicious
activity. It signals an alarm once an intrusion is detected. In this paper, an IDS based on Distributed
Machine Learning that detects phishing attacks and issues an alarm when the intrusion is detected has
been discussed. This is done by using SVM as the base algorithm. More on why SVM is used and how the
IDS can be applied to detect other types of intrusion has been discussed.
I. INTRODUCTION
Information which is existing in servers can be
accessed by hackers through web server
attacks. This can be achieved by hacking into
servers through the URLs of servers. The users
will be hacked when they browse or download
documents from web servers which has been
injected with malicious code.
Detecting these web attacks using Traditional
IDS such as snort and web application
firewalls (WAF) has been proved to be
penetrable. Hence applying deep learning
techniques to detect these web attacks is
difficult since different attacks possess
different signatures depending upon their
URLs. A Distributed system for detecting web
attacks from URLs has been proposed through
deep learning like CNN and other models
which utilize NLP.
A generic web attack detection system has
been proposed which can enhance the stability
through concurrent models. Phishing attack
exploits poor handling of untrusted data. It
could involve an attachment to an email that
loads malware onto the computer. It could also
be a link to an illegitimate website that can
trick the user into downloading the malware or
handling over our personal information.
A proxy is typically placed in front of the
server to examine the server’s responses
before they reach a user’s browser. Since a
firewall uses a set of rules to permit or deny
network connections, the intrusion will be
prevented by assuming whether a set of rules
have been detected or not. Thus, an IDS differs
from traditional firewalls.
II. EXISTING SYSTEM
Emerging social network sites have made it
easy to be attacked by cyber criminals every
day. Social network sites where the users
personal data maybe vandalized and untrusted
data is handled poorly, phishing attacks are
one that scams users by exploiting them to get
hold of their bank accounts and passwords.
Blogs, forums, paste and doc sites are all part
of the social media ecosystem[1]
. The phishing
attack may be either via Data Gathering,
Impersonation, credential theft. Phishing
attacks in social network sites can be presented
only if the user is careful enough by not
clicking on unfamiliar links and always
checking whether that website is a legitimated
website or not. By using some Antivirus or
Anti-phishing software these attacks can be
prevented.
III. PROPOSED SYTEM
Search engines supply a highly effective
means of information retrieving way. But the
search engine is also a platform for spreading
information. Because of these features, the
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 2 April 2020
ISSN NO 2582-0958
_________________________________________________________________________________________________________________________________
www.trendytechjournals.com
9
propagators of malicious code have kept in
step with search engines, building a hidden
relationship within them. In recent years, so-
called worms have utilized the search engine
to spread themselves across the Web. A search
engine is a quick and easy vehicle for
malicious code to locate new targets. An IDS
which can detect phishing attacks in a normal
social network site without the use of Anti-
phishing software has been proposed. If by
accident, the user clicks on phishing
malvertisements or links that leads to a
phishing sites, a warning will be issued
regarding the accessibility of the site and
whether it is a legitimate website or not.
The phishing URL is detected based on SVM.
SVM refers to Support Vector Machine. On
using SVM classification, a warning message
regarding the reliability of the website is based
on the MATLAB based computer program.
This is done to avoid users from becoming
victims by losing their information.
IV. ARCHITECTURE DIAGRAM
The Architecture of the system is as follows:
The Modules involved in the Architecture
Diagram are as follows:
1. Social Networks Module
2. Epidemic Module in Social Networks
3. Propagation Canalization Module
4. Feedback Module
Social networks module
With the proliferation of social networks and
their ever increasing use, viruses have become
much more prevalent. In this module the user
login to the application and use search engine
to search any content of data in the application
to get the required data with respective to the
keywords entered in the search engine.
Epidemic module in social networks
The user click the unofficial links and get
access the data along with virus which get
affected along with the retrieval of data then
application. In a static network, weakly
connected heterogeneous communities can
have significantly different infection levels.
Propagation canalization module
Results show the significant influence of a
search engine particularly its ability to
accelerate virus propagation in social
networks. In contrast, adaptation promotes
similar infection levels and alters the network
structure so that communities have more
similar average degrees
Feedback module
Based on the user review, the acceleration of
the virus in the official link has been predicted.
Whenever the user visits any uniform
resource locator (URL) through search engine.
They will be redirected to the uniform
resource locator (URL), the user will get the
broader details about the link how much it
affected or how much it is safe to access.
V. RELATED WORKS
An Algorithm to quantify the suspiciousness
ratings of web pages based on similarity of
visual appearance between web pages is
proposed in this paper [2]
. It is based on a
rating method on weighted page-component
similarity. In this paper [3]
, NFV is proposed to
address capital and operational expense issues
by implementing network functions as a pure
software on commodity and general hardware.
It has emerged as an approach to decouple the
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 2 April 2020
ISSN NO 2582-0958
_________________________________________________________________________________________________________________________________
www.trendytechjournals.com
10
software networking processing and
applications from their supported hardware
and allow network services to be implemented
as a software. Here [4]
, phishing websites are
detected using Google’s PageRank. Google
gives a PageRank value to each site in the
web. This work uses the PageRank value and
other features to classify phishing sites from
normal sites. Technologies of virtualization in
a fog network[5]
, an anti-phishing gateway can
be implemented as software at robust machine
learning techniques for phishing detection.
URL features and traffic features to detect
phishing websites based on a designed neuro-
fuzzy framework. A Heterogeneous classifier,
to determine the phishing category through an
intelligent anti-phishing strategy model for
categorization of websites has been proposed
[6]
.
VI. CONCLUSION
Thus an IDS, which focuses on phishing
attacks has been proposed which issues an
alarm when the link corresponding to phishing
sites has been accessed by the user. This
prevents the victim from losing untrusted data.
REFERENCES
[1] https://info.phishlabs.com/blog/how-social-
media-is-abused-for-phishing-attacks
[2] Phishing-Alarm: Robust and Efficient
phishing detection via Page component
similarity, Jian Mao, Wenqian Tian, Pei Li,
Tao Wei and Zhenkai Liang, “Volume 5,
August 23, 2017, Digital Object Identifier
10.1109/ACCESS 2017.2743528”
[3]Software-defined Network function
Virtualization: A Survey, Yong Li, Min Chen,
“Volume 3, December 9, 2015, Digital Object
Identifier 10.1109/ACCESS 2015.2499271”
[4]A PageRank based Detection technique
for phishing Web sites,A.Naga Venkata
Sunil, Anjali Sardana, “2012 IEEE
Symposium on Computers & Informatics”
[5]Phishing-Aware: A Neuro Fuzzy
approach for Anti-phishing on Fog
networks,Chuan Pham, Luong
A.T.Nguyen, Nguyen H.Tran , Eui-Nam
Huh, Choong Seon Hong, “IEEE
Transactions on Network and Service
Management, DOI
10.1109/TNSM.2018.2831197”
[6] An Intelligent anti-phishing strategy
model for Phishing Website Detection,
“Weiwei Zhuang, Qingshan Jiang, Tengke
Xiong, “2012, 32nd
International
Conference on Distributed Computing
Systems Workshops, DOI
10.1109/ICDCSW.2012.66”

More Related Content

PDF
Implementation of Data Mining Concepts in R Programming
PDF
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
PDF
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
PDF
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
PDF
NUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCE
PDF
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
Implementation of Data Mining Concepts in R Programming
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
NUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCE
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY

What's hot (19)

PDF
MOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASE
PDF
DISTRIBUTION SYSTEM SERVICE PROVIDED BY ELECTRIC VEHICLES
PDF
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
PDF
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
PDF
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PDF
IRJET - Centralized Data for Transport Automation System using Android St...
PDF
IRJET- Securing E-Medical Documents using QR Code
PDF
IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING INFRARED SENSORS
PDF
IOT based Industrial Automation using Raspberry Pi
PDF
Employee
PDF
IRJET - Remote Health Monitoring System using IoT
PDF
Ijsrdv7 i10842
PDF
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
PDF
IRJET- Medicine Information Retrieval Application- Pharmaguide
PDF
Android civil administration reporting
PDF
Provide security about risk score in mobile application’s
PDF
IRJET- UID Secure Travel Identity
PDF
IRJET- Travel Sequence Application
PDF
Designing of Pick and Place Robotic Arm
MOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASE
DISTRIBUTION SYSTEM SERVICE PROVIDED BY ELECTRIC VEHICLES
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET- Securing E-Medical Documents using QR Code
IMPLEMENTATION OF SECURE DOOR AUTOMATION SYSTEMS USING INFRARED SENSORS
IOT based Industrial Automation using Raspberry Pi
Employee
IRJET - Remote Health Monitoring System using IoT
Ijsrdv7 i10842
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET- Medicine Information Retrieval Application- Pharmaguide
Android civil administration reporting
Provide security about risk score in mobile application’s
IRJET- UID Secure Travel Identity
IRJET- Travel Sequence Application
Designing of Pick and Place Robotic Arm
Ad

Similar to A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING (20)

PDF
A multi-algorithm approach for phishing uniform resource locator’s detection
PPTX
PHISHING DETECTION PPT using fspam detection
PPTX
Classification with R
PPTX
GOTHAM ka MINI play had a very nice pic of you love me and after two years a...
PDF
Deep learning in phishing mitigation: a uniform resource locator-based predic...
PDF
Detecting Phishing using Machine Learning
PDF
IRJET- Survey on Phishing Attack Detection and Mitigation
PDF
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
PPTX
Presentation1.pptx
PDF
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PDF
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
PDF
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
PDF
IRJET- Phishing Website Detection based on Machine Learning
PDF
Detection of Phishing Websites using machine Learning Algorithm
PDF
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
PDF
IRJET- Phishing Web Site
DOCX
Literature Review.docx
PPTX
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
PDF
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
A multi-algorithm approach for phishing uniform resource locator’s detection
PHISHING DETECTION PPT using fspam detection
Classification with R
GOTHAM ka MINI play had a very nice pic of you love me and after two years a...
Deep learning in phishing mitigation: a uniform resource locator-based predic...
Detecting Phishing using Machine Learning
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
Presentation1.pptx
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
IRJET- Phishing Website Detection based on Machine Learning
Detection of Phishing Websites using machine Learning Algorithm
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
IRJET- Phishing Web Site
Literature Review.docx
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
Intrusion Detection System using AI and Machine Learning Algorithm
Ad

More from IJTRET-International Journal of Trendy Research in Engineering and Technology (20)

PDF
A NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATION
PDF
PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...
PDF
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
PDF
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
PDF
Emission Control in CI Engine using Ethanol Emulsion
PDF
EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON THERMOMECHANICAL PROPERTI...
PDF
OPTIMIZATION OF QUALITY ENHANCEMENT OF CNC MACHINING PROCESS BY USING NEURA...
PDF
Analysis of Gravity Die Casted Aluminium parts using MAGMA
PDF
PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE (LA3GA5.5NB0.5O14) CERAMICS...
PDF
AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR EXTRACTING ARTIFACT...
PDF
PRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICS
PDF
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
PDF
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
PDF
A REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONS
PDF
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
PDF
A NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATION
PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
Emission Control in CI Engine using Ethanol Emulsion
EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON THERMOMECHANICAL PROPERTI...
OPTIMIZATION OF QUALITY ENHANCEMENT OF CNC MACHINING PROCESS BY USING NEURA...
Analysis of Gravity Die Casted Aluminium parts using MAGMA
PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE (LA3GA5.5NB0.5O14) CERAMICS...
AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR EXTRACTING ARTIFACT...
PRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICS
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
A REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONS
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY

Recently uploaded (20)

PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
Feature types and data preprocessing steps
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
Java Basics-Introduction and program control
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
ai_satellite_crop_management_20250815030350.pptx
PPTX
Software Engineering and software moduleing
PDF
Introduction to Power System StabilityPS
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PPTX
wireless networks, mobile computing.pptx
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
Soil Improvement Techniques Note - Rabbi
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Feature types and data preprocessing steps
MLpara ingenieira CIVIL, meca Y AMBIENTAL
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
August -2025_Top10 Read_Articles_ijait.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Java Basics-Introduction and program control
Amdahl’s law is explained in the above power point presentations
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
distributed database system" (DDBS) is often used to refer to both the distri...
ai_satellite_crop_management_20250815030350.pptx
Software Engineering and software moduleing
Introduction to Power System StabilityPS
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
wireless networks, mobile computing.pptx
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Soil Improvement Techniques Note - Rabbi

A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING

  • 1. International Journal of Trendy Research in Engineering and Technology Volume 4 Issue 2 April 2020 ISSN NO 2582-0958 _________________________________________________________________________________________________________________________________ www.trendytechjournals.com 8 A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING B.Bhagavathy Preetha1 , A.B.Harsha Vardhni1 , M.Monica1 Dr.R.Geetha2 UG Students1 , Professor2 ,Department of Computer Science and Engineering S.A.Engineering College, Chennai – 77. [email protected]) , [email protected]) , [email protected]) ABSTRACT Typically an IDS refers to a software application that monitors a network for intrusion or malicious activity. It signals an alarm once an intrusion is detected. In this paper, an IDS based on Distributed Machine Learning that detects phishing attacks and issues an alarm when the intrusion is detected has been discussed. This is done by using SVM as the base algorithm. More on why SVM is used and how the IDS can be applied to detect other types of intrusion has been discussed. I. INTRODUCTION Information which is existing in servers can be accessed by hackers through web server attacks. This can be achieved by hacking into servers through the URLs of servers. The users will be hacked when they browse or download documents from web servers which has been injected with malicious code. Detecting these web attacks using Traditional IDS such as snort and web application firewalls (WAF) has been proved to be penetrable. Hence applying deep learning techniques to detect these web attacks is difficult since different attacks possess different signatures depending upon their URLs. A Distributed system for detecting web attacks from URLs has been proposed through deep learning like CNN and other models which utilize NLP. A generic web attack detection system has been proposed which can enhance the stability through concurrent models. Phishing attack exploits poor handling of untrusted data. It could involve an attachment to an email that loads malware onto the computer. It could also be a link to an illegitimate website that can trick the user into downloading the malware or handling over our personal information. A proxy is typically placed in front of the server to examine the server’s responses before they reach a user’s browser. Since a firewall uses a set of rules to permit or deny network connections, the intrusion will be prevented by assuming whether a set of rules have been detected or not. Thus, an IDS differs from traditional firewalls. II. EXISTING SYSTEM Emerging social network sites have made it easy to be attacked by cyber criminals every day. Social network sites where the users personal data maybe vandalized and untrusted data is handled poorly, phishing attacks are one that scams users by exploiting them to get hold of their bank accounts and passwords. Blogs, forums, paste and doc sites are all part of the social media ecosystem[1] . The phishing attack may be either via Data Gathering, Impersonation, credential theft. Phishing attacks in social network sites can be presented only if the user is careful enough by not clicking on unfamiliar links and always checking whether that website is a legitimated website or not. By using some Antivirus or Anti-phishing software these attacks can be prevented. III. PROPOSED SYTEM Search engines supply a highly effective means of information retrieving way. But the search engine is also a platform for spreading information. Because of these features, the
  • 2. International Journal of Trendy Research in Engineering and Technology Volume 4 Issue 2 April 2020 ISSN NO 2582-0958 _________________________________________________________________________________________________________________________________ www.trendytechjournals.com 9 propagators of malicious code have kept in step with search engines, building a hidden relationship within them. In recent years, so- called worms have utilized the search engine to spread themselves across the Web. A search engine is a quick and easy vehicle for malicious code to locate new targets. An IDS which can detect phishing attacks in a normal social network site without the use of Anti- phishing software has been proposed. If by accident, the user clicks on phishing malvertisements or links that leads to a phishing sites, a warning will be issued regarding the accessibility of the site and whether it is a legitimate website or not. The phishing URL is detected based on SVM. SVM refers to Support Vector Machine. On using SVM classification, a warning message regarding the reliability of the website is based on the MATLAB based computer program. This is done to avoid users from becoming victims by losing their information. IV. ARCHITECTURE DIAGRAM The Architecture of the system is as follows: The Modules involved in the Architecture Diagram are as follows: 1. Social Networks Module 2. Epidemic Module in Social Networks 3. Propagation Canalization Module 4. Feedback Module Social networks module With the proliferation of social networks and their ever increasing use, viruses have become much more prevalent. In this module the user login to the application and use search engine to search any content of data in the application to get the required data with respective to the keywords entered in the search engine. Epidemic module in social networks The user click the unofficial links and get access the data along with virus which get affected along with the retrieval of data then application. In a static network, weakly connected heterogeneous communities can have significantly different infection levels. Propagation canalization module Results show the significant influence of a search engine particularly its ability to accelerate virus propagation in social networks. In contrast, adaptation promotes similar infection levels and alters the network structure so that communities have more similar average degrees Feedback module Based on the user review, the acceleration of the virus in the official link has been predicted. Whenever the user visits any uniform resource locator (URL) through search engine. They will be redirected to the uniform resource locator (URL), the user will get the broader details about the link how much it affected or how much it is safe to access. V. RELATED WORKS An Algorithm to quantify the suspiciousness ratings of web pages based on similarity of visual appearance between web pages is proposed in this paper [2] . It is based on a rating method on weighted page-component similarity. In this paper [3] , NFV is proposed to address capital and operational expense issues by implementing network functions as a pure software on commodity and general hardware. It has emerged as an approach to decouple the
  • 3. International Journal of Trendy Research in Engineering and Technology Volume 4 Issue 2 April 2020 ISSN NO 2582-0958 _________________________________________________________________________________________________________________________________ www.trendytechjournals.com 10 software networking processing and applications from their supported hardware and allow network services to be implemented as a software. Here [4] , phishing websites are detected using Google’s PageRank. Google gives a PageRank value to each site in the web. This work uses the PageRank value and other features to classify phishing sites from normal sites. Technologies of virtualization in a fog network[5] , an anti-phishing gateway can be implemented as software at robust machine learning techniques for phishing detection. URL features and traffic features to detect phishing websites based on a designed neuro- fuzzy framework. A Heterogeneous classifier, to determine the phishing category through an intelligent anti-phishing strategy model for categorization of websites has been proposed [6] . VI. CONCLUSION Thus an IDS, which focuses on phishing attacks has been proposed which issues an alarm when the link corresponding to phishing sites has been accessed by the user. This prevents the victim from losing untrusted data. REFERENCES [1] https://info.phishlabs.com/blog/how-social- media-is-abused-for-phishing-attacks [2] Phishing-Alarm: Robust and Efficient phishing detection via Page component similarity, Jian Mao, Wenqian Tian, Pei Li, Tao Wei and Zhenkai Liang, “Volume 5, August 23, 2017, Digital Object Identifier 10.1109/ACCESS 2017.2743528” [3]Software-defined Network function Virtualization: A Survey, Yong Li, Min Chen, “Volume 3, December 9, 2015, Digital Object Identifier 10.1109/ACCESS 2015.2499271” [4]A PageRank based Detection technique for phishing Web sites,A.Naga Venkata Sunil, Anjali Sardana, “2012 IEEE Symposium on Computers & Informatics” [5]Phishing-Aware: A Neuro Fuzzy approach for Anti-phishing on Fog networks,Chuan Pham, Luong A.T.Nguyen, Nguyen H.Tran , Eui-Nam Huh, Choong Seon Hong, “IEEE Transactions on Network and Service Management, DOI 10.1109/TNSM.2018.2831197” [6] An Intelligent anti-phishing strategy model for Phishing Website Detection, “Weiwei Zhuang, Qingshan Jiang, Tengke Xiong, “2012, 32nd International Conference on Distributed Computing Systems Workshops, DOI 10.1109/ICDCSW.2012.66”