Application of Extreme Learning Machine (ELM) Classification in Detecting Phishing Sites

M. R. Ridho, H. Nuha
{"title":"Application of Extreme Learning Machine (ELM) Classification in Detecting Phishing Sites","authors":"M. R. Ridho, H. Nuha","doi":"10.1109/IC2IE56416.2022.9970191","DOIUrl":null,"url":null,"abstract":"Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like accessing a site from an official website. In overcoming the many phishing sites that exist in this study, the Extreme Learning Machine (ELM) classification method is used because ELM is one of the algorithms that is often used in classification and regression in machine learning. In this study, the accuracy value obtained from the test which was repeated 10 times was between 82-84% and the time between 5–11 $s$ with the best accuracy of 84.02% with a time of 7.98 $s$, the accuracy results generated from the ELM algorithm are indeed not very good. This large amount occurs because of the overfitting experienced by the formed classification model so that the false positives obtained are quite large. Referring to the dataset itself, the most influential feature or attribute in the labeling of phishing sites is the time domain expires, if the time domain expires has reached 200 days then the site has a phishing site label. In this study, ELM was compared with several other machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes and Decision Tree.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC2IE56416.2022.9970191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like accessing a site from an official website. In overcoming the many phishing sites that exist in this study, the Extreme Learning Machine (ELM) classification method is used because ELM is one of the algorithms that is often used in classification and regression in machine learning. In this study, the accuracy value obtained from the test which was repeated 10 times was between 82-84% and the time between 5–11 $s$ with the best accuracy of 84.02% with a time of 7.98 $s$, the accuracy results generated from the ELM algorithm are indeed not very good. This large amount occurs because of the overfitting experienced by the formed classification model so that the false positives obtained are quite large. Referring to the dataset itself, the most influential feature or attribute in the labeling of phishing sites is the time domain expires, if the time domain expires has reached 200 days then the site has a phishing site label. In this study, ELM was compared with several other machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes and Decision Tree.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
极限学习机(ELM)分类在钓鱼网站检测中的应用
网络钓鱼网站是由网络犯罪分子创建的尽可能接近真实网站的网站,通过将其伪装成从官方网站访问网站来欺骗互联网用户。在克服本研究中存在的许多网络钓鱼站点时,使用了极限学习机(ELM)分类方法,因为ELM是机器学习中经常用于分类和回归的算法之一。在本研究中,重复10次的测试得到的准确率值在82-84%之间,时间在5-11 $s$之间,最佳准确率为84.02%,时间为7.98 $s$, ELM算法产生的准确率结果确实不是很好。之所以出现如此大的数量,是因为所形成的分类模型经历了过拟合,从而得到了相当大的误报。就数据集本身而言,钓鱼网站标签中影响最大的特征或属性是时间域过期,如果时间域过期达到200天,则该网站具有钓鱼网站标签。在本研究中,ELM与其他几种机器学习算法如支持向量机(SVM)、朴素贝叶斯和决策树进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using Cohesion-Based and Sentiment-Based Attributes to Classify Spoilers in Movie Reviews Development of a Mobile Application for the Early Detection of Skin Cancer using Image Processing Algorithms, Transfer Learning, and AutoKeras Analysis Factors Affecting Consumer Preferences in using Qris Payment In-Store Progressive Web Application (PWA) Development for Outfit Management System Development of Animation as a Medium for Public Health Education
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1