Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{177074,
author = {Paiavula Ankith and A.Hemanth and B.Suresh and K.Karthik and P.Sathish},
title = {Modeling and Predicting Cyber Hacking Breaches},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {11},
number = {12},
pages = {3670-3674},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=177074},
abstract = {The paper offers a practical method for detecting and classifying malicious URLs using a machine learning model that utilizes the Support Vector Machine (SVM) algorithm. The system determines whether URLs are malicious or safe by analyzing a dataset that contains known malicious indicators associated with different types of cyberattacks, including phishing, man-in-the-middle, and SQL injection. Real-world flag data is used to support the research and it was tested on a diverse set of URLs. By storing and analyzing the results, statistical insights are gained, which allows for visualization of attack distributions. By offering an automated, data-driven framework, the study helps cybersecurity research by identifying and mitigating web-based threats.},
keywords = {},
month = {May},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry