Secure QR Code Scanner to Detect Malicious URL using Machine Learning

Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji
{"title":"Secure QR Code Scanner to Detect Malicious URL using Machine Learning","authors":"Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji","doi":"10.1109/ASIANCON55314.2022.9908759","DOIUrl":null,"url":null,"abstract":"Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIANCON55314.2022.9908759","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全QR码扫描仪检测恶意URL使用机器学习
Q-R码用于各种目的,包括访问在线网页和进行结算。互联网为各种非法行为提供了便利,包括未经请求的电子营销、挪用资金和恶意分销。尽管所有用户都能直观地识别出Q-R码的存在,但存储在这些码中的信息只能通过分配的Q-R码解码器访问。Q-R代码也被证明是一种有效的攻击载体,例如技术包括社会工程,网络钓鱼,钓鱼等。有害的代码在拥挤的地区以虚假的名义分发,或者恶意的Q-R代码粘贴在广告牌上的现有代码之上。最后,消费者依靠解码器操作系统来确定一个随机Q-R码是恶意还是良性。在本报告中,我们将恶意Q-R码的识别视为一个双向分类问题,并测试了许多知名的M-L算法的有效性,包括k -近邻算法、随机森林算法、二进制LSTM算法和支持向量机算法。这意味着所提出的方法可能被认为是一种最佳的、用户友好的二维码安全解决方案。我们创建了一个原型来测试我们的建议,发现它既安全又可用,可以保护用户免受有害QR码的伤害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Distributed Multi-Sensor DCNN & Multivariate Time Series Classification Based technique for Earthquake early warning Cross Technology Communication between LTE-U and Wi-Fi to Improve Overall QoS of 5G System Prediction of Ayurvedic Herbs for Specific Diseases by Classification Techniques in Machine Learning Face Mask Detection Using Machine Learning Techniques Closed-form BER Expressions of QPSK Modulation over NOMA-PNC Parallel Relay Channels
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1