Papers Topicos

Embed Size (px)

Citation preview

  • 8/18/2019 Papers Topicos

    1/15

  • 8/18/2019 Papers Topicos

    2/15

    DATA MINING APLICADO A PHISHING

    1.ÍNDICE

    1. CONCEPTOS55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555-

    2. PAPER 1: ASSESING THE SEVERETY OF PHISHING ATTACKS: A HYBRID DATA MINING

    APPROACH555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555-2.1. DATOS GENERALES.........................................................................................5

    2.2. RESUMEN.......................................................................................................5

    2.3. OBJETIVOS......................................................................................................6

    2.4. EXPLICACIÓN DE LA PROPUESTA.....................................................................6

    2.. RESULTADOS...................................................................................................7

    2.!. CONCLUSIONES...............................................................................................8

    2.". APRECIACIÓN CR#TICA....................................................................................8

    3. PAPER 2: DATA MINING FOR CREDIT CARD FRAUD. A COMPARATIVE STUDY55555555555555563.1. DATOS GENERALES.........................................................................................9

    3.2. PROBLEMA.....................................................................................................9

    3.3. OBJETIVOS......................................................................................................9

    3.4. EXPLICACIÓN DE LA PROPUESTA.....................................................................9

    3.. RESULTADOS...................................................................................................9

    3.!. CONCLUSIONES...............................................................................................9

    3.". APRECIACIÓN CR#TICA....................................................................................9

    FU$$Y DATA MINING55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555510

    4.1. DATOS GENERALES.......................................................................................10

    4.2. RESUMEN.....................................................................................................10

    4.3. PROBLEMA...................................................................................................10

    4.4. OBJETIVOS....................................................................................................11

    4.. EXPLICACIÓN DE LA PROPUESTA...................................................................11

    4.!. RESULTADOS.................................................................................................14

    4.". CONCLUSIONES.............................................................................................164.%. APRECIACIÓN CR#TICA..................................................................................17

    T Ó P I C O S D E I N G E N I E R Í A D E S I S T E M A S   P 7 & i n a 2 8 1-

    http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468http://var/www/apps/conversion/tmp/scratch_1/HYPERLINK%23_Toc449043468

  • 8/18/2019 Papers Topicos

    3/15

    DATA MINING APLICADO A PHISHING

    2.3. CONCEPTOS

    • D&'& M()()*: E+ D&'& M()()* ,-()/0& &'5 + 6)78)' '96)(6& '6)+*0& ;8 7'(@ )6)'/&/  

  • 8/18/2019 Papers Topicos

    4/15

    DATA MINING APLICADO A PHISHING

    4.3. O*'ETI+OS

    Pr""p$!: P//( '=' -()/0& &'5 ;8 8'(+(& +& '96)(6&

    ='/&66() /& 6+&@ /(/ (-

  • 8/18/2019 Papers Topicos

    5/15

    DATA MINING APLICADO A PHISHING

    • P&/& '/-()&/ +& */&@& + &'&;8 &)6&/(& ) /-& -)&7 6// +6'/)(6 (/(*(& & + 6+()' + >&)6.

    P/ + -? (-

  • 8/18/2019 Papers Topicos

    6/15

    DATA MINING APLICADO A PHISHING

    S &) /&+(& (@/& ()@'(*&6() ) + '-& + ;8 ' )(@+ & /

  • 8/18/2019 Papers Topicos

    7/15

    DATA MINING APLICADO A PHISHING

    . PAPER 2: DATA MINING FOR CREDIT CARD FRAUD. A COMPARATIVE STUDY

    /.1. DATOS GENERALES

    • A8'/:• A +(6&6():• J8/)&+:

    /.(. PRO*LEMA

    /.3. O*'ETI+OS

    /.4. EPLICACIÓN DE LA PROP)ESTA

    /./. RES)LTADOS/.0. CONCL)SIONES/.. APRECIACIÓN CRÍTICA

    T Ó P I C O S D E I N G E N I E R Í A D E S I S T E M A S   P 7 & i n a 8 1-

  • 8/18/2019 Papers Topicos

    8/15

    DATA MINING APLICADO A PHISHING

    !. PAPER 3: INTELLIGENT PHISHING DETECTION SYSTEM FOR EBANKING USINGFU$$Y DATA MINING

    0.1. DATOS GENERALES

    • Autores: M&/ A+>8//85 M.A. H(&)5 K&@ D&&+5 F&( T&>'&  Año de pu!"#$#"%&: 21 

    'our&$!: ELSEVIER 

    0.(. RES)MEN.%. L& '66() ()'((6&6()

  • 8/18/2019 Papers Topicos

    9/15

    DATA MINING APLICADO A PHISHING

    H&6/ 8) -+ +=(>+ (6& ;8 8'(+(6 &+*/('- '96)(6& D&'& M()()*

    L*(6& D(8&

  • 8/18/2019 Papers Topicos

    10/15

    DATA MINING APLICADO A PHISHING

    L 6-

  • 8/18/2019 Papers Topicos

    11/15

    DATA MINING APLICADO A PHISHING

    P&/& + ()(6&/ /(* +&

  • 8/18/2019 Papers Topicos

    12/15

    DATA MINING APLICADO A PHISHING

    (5.1. RES)LTADOS

    A+*8) /8+'& + =

  • 8/18/2019 Papers Topicos

    13/15

    DATA MINING APLICADO A PHISHING

    1

    32 3 4

    L @&+/ )'/&& & & +& '/ )'/&&5 ;8 ) +& 6&

  • 8/18/2019 Papers Topicos

    14/15

    DATA MINING APLICADO A PHISHING

    18 Dd, 3ALSO 3ALSO!y

    &-",-y

    19 3/ade Legal LegalS,&e%-

    ,

    '0 3/ade Legal I#%"e/$S,&e%-

    ,

    '1 3/ade Legal 3ALSO P-",-y

    '' 3/ade I#%"e/$ LegalS,&e%-

    ,

    '( 3/ade I#%"e/$ I#%"e/$ P-",-y

    '4 3/ade I#%"e/$ 3ALSO P-",-y

    '5 3/ade 3ALSO Legal P-",-y

    '6 3/ade 3ALSO I#%"e/$!y

    &-",-y

    '7 3/ade 3ALSO 3ALSO!y

    &-",-y

    (5.(. CONCL)SIONES

    E+ -+ -()/0& &' (8 &)6& +6'/)(6& ,URL I)'(& -()( /+8' ;8 + ('( > + '6'&>+.

    (5.3. APRECIACIÓN CRÍTICA

    E+ -+

  • 8/18/2019 Papers Topicos

    15/15

    DATA MINING APLICADO A PHISHING

    E+ &8'/ '&->(9) > &6/ 8)& 6-(9) >( /&+(&/ 8)& 6-