papers topicos
TRANSCRIPT
-
8/18/2019 Papers Topicos
1/15
-
8/18/2019 Papers Topicos
2/15
DATA MINING APLICADO A PHISHING
1.ÍNDICE
1. CONCEPTOS55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555-
2. PAPER 1: ASSESING THE SEVERETY OF PHISHING ATTACKS: A HYBRID DATA MINING
APPROACH555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555-2.1. DATOS GENERALES.........................................................................................5
2.2. RESUMEN.......................................................................................................5
2.3. OBJETIVOS......................................................................................................6
2.4. EXPLICACIÓN DE LA PROPUESTA.....................................................................6
2.. RESULTADOS...................................................................................................7
2.!. CONCLUSIONES...............................................................................................8
2.". APRECIACIÓN CR#TICA....................................................................................8
3. PAPER 2: DATA MINING FOR CREDIT CARD FRAUD. A COMPARATIVE STUDY55555555555555563.1. DATOS GENERALES.........................................................................................9
3.2. PROBLEMA.....................................................................................................9
3.3. OBJETIVOS......................................................................................................9
3.4. EXPLICACIÓN DE LA PROPUESTA.....................................................................9
3.. RESULTADOS...................................................................................................9
3.!. CONCLUSIONES...............................................................................................9
3.". APRECIACIÓN CR#TICA....................................................................................9
FU$$Y DATA MINING55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555510
4.1. DATOS GENERALES.......................................................................................10
4.2. RESUMEN.....................................................................................................10
4.3. PROBLEMA...................................................................................................10
4.4. OBJETIVOS....................................................................................................11
4.. EXPLICACIÓN DE LA PROPUESTA...................................................................11
4.!. RESULTADOS.................................................................................................14
4.". CONCLUSIONES.............................................................................................164.%. APRECIACIÓN CR#TICA..................................................................................17
T Ó P I C O S D E I N G E N I E R Í A D E S I S T E M A S P 7 & i n a 2 8 1-
http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468
-
8/18/2019 Papers Topicos
3/15
DATA MINING APLICADO A PHISHING
2.3. CONCEPTOS
• D&'& M()()*: E+ D&'& M()()* ,-()/0& &'5 + 6)78)' '96)(6& '6)+*0& ;8 7'(@ )6)'/&/
-
8/18/2019 Papers Topicos
4/15
DATA MINING APLICADO A PHISHING
4.3. O*'ETI+OS
Pr""p$!: P//( '=' -()/0& &'5 ;8 8'(+(& +& '96)(6&
='/&66() /& 6+&@ /(/ (-
-
8/18/2019 Papers Topicos
5/15
DATA MINING APLICADO A PHISHING
• P&/& '/-()&/ +& */&@& + &'&;8 &)6&/(& ) /-& -)&7 6// +6'/)(6 (/(*(& & + 6+()' + >&)6.
P/ + -? (-
-
8/18/2019 Papers Topicos
6/15
DATA MINING APLICADO A PHISHING
S &) /&+(& (@/& ()@'(*&6() ) + '-& + ;8 ' )(@+ & /
-
8/18/2019 Papers Topicos
7/15
DATA MINING APLICADO A PHISHING
. PAPER 2: DATA MINING FOR CREDIT CARD FRAUD. A COMPARATIVE STUDY
/.1. DATOS GENERALES
• A8'/:• A +(6&6():• J8/)&+:
/.(. PRO*LEMA
/.3. O*'ETI+OS
/.4. EPLICACIÓN DE LA PROP)ESTA
/./. RES)LTADOS/.0. CONCL)SIONES/.. APRECIACIÓN CRÍTICA
T Ó P I C O S D E I N G E N I E R Í A D E S I S T E M A S P 7 & i n a 8 1-
-
8/18/2019 Papers Topicos
8/15
DATA MINING APLICADO A PHISHING
!. PAPER 3: INTELLIGENT PHISHING DETECTION SYSTEM FOR EBANKING USINGFU$$Y DATA MINING
0.1. DATOS GENERALES
• Autores: M&/ A+>8//85 M.A. H(&)5 K&@ D&&+5 F&( T&>'& Año de pu!"#$#"%&: 21
'our&$!: ELSEVIER
0.(. RES)MEN.%. L& '66() ()'((6&6()
-
8/18/2019 Papers Topicos
9/15
DATA MINING APLICADO A PHISHING
H&6/ 8) -+ +=(>+ (6& ;8 8'(+(6 &+*/('- '96)(6& D&'& M()()*
L*(6& D(8&
-
8/18/2019 Papers Topicos
10/15
DATA MINING APLICADO A PHISHING
L 6-
-
8/18/2019 Papers Topicos
11/15
DATA MINING APLICADO A PHISHING
P&/& + ()(6&/ /(* +&
-
8/18/2019 Papers Topicos
12/15
DATA MINING APLICADO A PHISHING
(5.1. RES)LTADOS
A+*8) /8+'& + =
-
8/18/2019 Papers Topicos
13/15
DATA MINING APLICADO A PHISHING
1
32 3 4
L @&+/ )'/&& & & +& '/ )'/&&5 ;8 ) +& 6&
-
8/18/2019 Papers Topicos
14/15
DATA MINING APLICADO A PHISHING
18 Dd, 3ALSO 3ALSO!y
&-",-y
19 3/ade Legal LegalS,&e%-
,
'0 3/ade Legal I#%"e/$S,&e%-
,
'1 3/ade Legal 3ALSO P-",-y
'' 3/ade I#%"e/$ LegalS,&e%-
,
'( 3/ade I#%"e/$ I#%"e/$ P-",-y
'4 3/ade I#%"e/$ 3ALSO P-",-y
'5 3/ade 3ALSO Legal P-",-y
'6 3/ade 3ALSO I#%"e/$!y
&-",-y
'7 3/ade 3ALSO 3ALSO!y
&-",-y
(5.(. CONCL)SIONES
E+ -+ -()/0& &' (8 &)6& +6'/)(6& ,URL I)'(& -()( /+8' ;8 + ('( > + '6'&>+.
(5.3. APRECIACIÓN CRÍTICA
E+ -+
-
8/18/2019 Papers Topicos
15/15
DATA MINING APLICADO A PHISHING
E+ &8'/ '&->(9) > &6/ 8)& 6-(9) >( /&+(&/ 8)& 6-