基于贝叶斯优化SVM分类器的钓鱼URL检测

Shrishti Shukla, Pratyush Sharma
{"title":"基于贝叶斯优化SVM分类器的钓鱼URL检测","authors":"Shrishti Shukla, Pratyush Sharma","doi":"10.1109/ICECA49313.2020.9297412","DOIUrl":null,"url":null,"abstract":"This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detection of Phishing URL using Bayesian Optimized SVM Classifier\",\"authors\":\"Shrishti Shukla, Pratyush Sharma\",\"doi\":\"10.1109/ICECA49313.2020.9297412\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.\",\"PeriodicalId\":297285,\"journal\":{\"name\":\"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA49313.2020.9297412\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA49313.2020.9297412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文旨在收集、映射和建模自动发现网络钓鱼UR的元素,为此使用数据挖掘作为基本工具,从这个意义上说,认为URL中的现有模式将使区分页面的合法链接成为可能。然而,这些模式的识别将有助于建立一个成功的分类方法。为此,将验证数据库“phishing web”中发现的与网络钓鱼页面模式相对应的属性,同时对从文献中提取的算法进行评估,使其能够更好地对记录进行分类,最后给出一个精度最高的模型,该模型由贝叶斯优化的支持向量机分类器组成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Detection of Phishing URL using Bayesian Optimized SVM Classifier
This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of Prosodic features for the degree of emotions of an Assamese Emotional Speech MCU system based on IEC61508 for Autonomous Functional safety platform Comparative analysis of facial recognition models using video for real time attendance monitoring system Analysis of using IoT Sensors in Healthcare units Supported by Cloud Computing Human Friendly Smart Trolley with Automatic Billing System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1