|Malicious URL Detection using Machine Learning|
|Shreya Samir Labhsetwar, Tushar B. Kute|
|Cite This Article:|
Malicious URL Detection using Machine Learning, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 6 ,Issue 3 ,Page(s):142-147 ,August 2019 ,Available :IJIRT148580_PAPER.pdf
|Machine Learning, URL, Support Vector Machine, Decision Trees, Random Forest and k-Nearest Neighbours and logistic regression|
|Internet underpins a wide range of crimes, for example, spreading of Malwares and Misrepresentation of data usage. In spite of the fact that the exact inspirations driving these plans may vary, the shared factor lies in the way that clueless clients visit their locales. These visits can be driven by email, web list items or connections from other website pages. In all cases, in any case, the client is required to make some move, for example, tapping on an ideal Uniform Resource Locator (URL). In this paper, we address the identification of pernicious URL’s using various machine learning algorithms specifically Support Vector Machines, Decision Trees, Random Forest and k-Nearest Neighbours and logistic regression. Besides, we embraced an open dataset including various URLs (examples) and their corresponding labels. Specifically, Random Forest and Support Vector Machines achieve the most astounding precision. The phishing issue is tremendous and there does not exist just a single answer to limit all vulnerabilities viably, hence the systems are actualized and implemented.|
|Unique Paper ID: 148580|
Publication Volume & Issue: Volume 6, Issue 3
Page(s): 142 - 147
|Article Preview & Download|
Review Paper on Power System Blackout: A Serious I...
Paper ID : IJIRT148853
Function Overloading Implementation in C++...
Paper ID : IJIRT148851
EXPERIMENTAL INVESTIGATION OF AIR SWIRL TECHNIQUE ...
Paper ID : IJIRT148850
ANALYSIS OF NEWTON RAPHSON METHOD...
Paper ID : IJIRT148847
DESIGN OF A MONITORING SYSTEM FOR WASTE MANAGEMENT...
Paper ID : IJIRT148846