Phishing Detection Applications for Website and Domain at Browser using Virustototal API
DOI:
https://doi.org/10.21512/emacsjournal.v5i2.9998Keywords:
Phishing, Phishing Detection, Browser ExtentionAbstract
The purpose of this research is to create a browser extension-based application that can detect malicious sites to minimize phishing attacks. The research method used is to conduct a literature study and collect data from the questionnaire results. Research testing methods are blackbox testing, performance testing using 100 URL with precision and recall method, and comparison between two other simillar applications. The results of this study indicate that this application has good functionality and can reduce phishing attacks on users. The conclusion that can be drawn from this research is that the malicious site detection feature in browser extensions can enhance user protection from phishing attacks
Plum Analytics
References
Academy, B. (2021, October 29). Apa itu Javascript? Manfaat, Fungsi dan Contohnya. https://www.binaracademy.com/blog/apa-itu-javascript-manfaat-fungsi-dan-contohnya
Adani, M. R. (2021, June 22). Data Flow Diagram (DFD): Pengertian, Jenis, Fungsi & Contoh. https://www.sekawanmedia.co.id/blog/dfd-adalah/
Alnavar, K., Kumar, R. U., & Babu, C. N. (2021). Document Parsing Tool for Language Translation and Web Crawling using Django REST Framework. Journal of Physics: Conference Series, 1962(1), 012018. https://doi.org/10.1088/1742-6596/1962/1/012018
APWG. (2022) Phishing Activity Trends Reports Q2 2022. https://apwg.org/trendsreports/
Azizah, K. (2021, February 18). Pengertian HTML Lengkap dengan Fungsi dan Sejarah Kemunculannya. merdeka.com. https://www.merdeka.com/trending/pengertian-html-lengkap-dengan-fungsi-dan-sejarah-kemunculannya-kln.html
C., Ariata. (2022, December 14). Apa Itu CSS? Pengertian, Fungsi, dan Cara Kerjanya. Hostinger Tutorial. https://www.hostinger.co.id/tutorial/apa-itu-css
Choudhury, N. (2014). World Wide Web and Its Journey from Web 1.0 to Web 4.0. International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (6), 8096-8100.
D. Zhang, Z. Yan, H. Jiang, dan T. Kim, “A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites,” Inf. Manage., vol. 51, no. 7, hal. 845–853, Nov 2014.
Finaka, A. W., Fauzi, A., & Munir, T. S. (2018). https://indonesiabaik.id/infografis/penggunaan-komputer-saat-terhubung-internet-di-indonesia-15
Khawas, C. & Shah, P. (2018). Application of Firebase in Android App Development-A Study. https://www.researchgate.net/profile/Chunnu-Khawas/publication/325791990_Application_of_Firebase_in_Android_App_Development-A_Study/links/5bab55ed45851574f7e6801e/Application-of-Firebase-in-Android-App-Development-A-Study.pdf
Kurniawati, P. (2018, November 2). Pengujian Sistem - SkyshiDigital. Medium. https://medium.com/skyshidigital/pengujian-sistem-52940ee98c77
Meador, D. (2020, June 19). What is Data Dictionary. https://www.tutorialspoint.com/What-is-Data-Dictionary
Narkhede, S. (2021, June 15). Understanding Confusion Matrix - Towards Data Science. Medium. https://towardsdatascience.com/understanding-confusion-matrix-a9ad42dcfd62
Pradiptamukherjee. (2022, November 29). What is a Flowchart and its Types? https://www.geeksforgeeks.org/what-is-a-flowchart-and-its-types/
Purwiantono, F. E. (2017). MODEL KLASIFIKASI UNTUK DETEKSI SITUS PHISHING DI INDONESIA (Master’s thesis, Surabaya, 2017) (pp. 1-135). Surabaya: Institut Teknologi Sepuluh Nopember. https://repository.its.ac.id/43198/2/5215201006%20-%20Master_Thesis.pdf
Pyram, J. (2021, December 16). 9 Parts of a URL You Should Know - Joseph Pyram. Medium. https://medium.com/@joseph.pyram/9-parts-of-a-url-that-you-should-know-89fea8e11713
Simplylearn. (2023, January 11). What is a Database? Everything You Need to Know. https://www.simplilearn.com/tutorials/dbms-tutorial/what-is-a-database
Sohan, S. M., Anslow, C., & Maurer, F. (2015). A Case Study of Web API Evolution. World Congress on Services. https://doi.org/10.1109/services.2015.43
Sommerville, I. (2015). Software Engineering (10th ed.). Pearson.
Srinath, K. R. (2017). Python – The Fastest Growing Programming Language. International Research Journal of Engineering and Technology (IRJET), Vol. 4 (12), 354-357.
Statcounter. (2023). Statcounter Global Stats. https://gs.statcounter.com/browser-market-share/all/indonesia#monthly-202201-202212
Szurdi, J. (2021, November 11). A Peek into Top-Level Domains and Cybercrime. https://unit42.paloaltonetworks.com/top-level-domains-cybercrime/
Visual Paradigm. (n.d.). What is Entity Relationship Diagram (ERD)? https://www.visual-paradigm.com/guide/data-modeling/what-is-entity-relationship-diagram/
Wibisono, G., & Susanto, W. E. (2015). Perancangan Website Sebagai Media Informasi Dan Promosi Batik Khas Kabupaten Kulonprogo. EVOLUSI: Jurnal Sains Dan Manajemen, 3(2). https://doi.org/10.31294/evolusi.v3i2.630
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Engineering, MAthematics and Computer Science (EMACS) Journal
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)