{"title":"基于贝叶斯优化SVM分类器的钓鱼URL检测","authors":"Shrishti Shukla, Pratyush Sharma","doi":"10.1109/ICECA49313.2020.9297412","DOIUrl":null,"url":null,"abstract":"This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detection of Phishing URL using Bayesian Optimized SVM Classifier\",\"authors\":\"Shrishti Shukla, Pratyush Sharma\",\"doi\":\"10.1109/ICECA49313.2020.9297412\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.\",\"PeriodicalId\":297285,\"journal\":{\"name\":\"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA49313.2020.9297412\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA49313.2020.9297412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of Phishing URL using Bayesian Optimized SVM Classifier
This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.