Journal article Open Access

A Phishing URL Classification Technique using Machine Learning Approach

Manish Tiwari; Dr. Tripti Arjariya


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/5833442">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5833442</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/5833442"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Manish Tiwari</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Computer Science from Gargi Institute of Science &amp; Technology, Bhopal Madhya Pradesh. India</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Dr. Tripti Arjariya</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Professor, Department of Computer Science Engineering, Rajiv Gandhi Technical University, Bhopal. Madhya Pradesh. India</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>A Phishing URL Classification Technique using Machine Learning Approach</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2021</dct:issued>
    <dcat:keyword>Phishing detection, URL classification, association rule mining, rule based classification, apriori algorithm, FP-Tree algorithm.</dcat:keyword>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>2278-3075</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>issn</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <dct:subject>
      <skos:Concept>
        <skos:prefLabel>100.1/ijitee.C83380110321</skos:prefLabel>
        <skos:inScheme>
          <skos:ConceptScheme>
            <dct:title>handle</dct:title>
          </skos:ConceptScheme>
        </skos:inScheme>
      </skos:Concept>
    </dct:subject>
    <schema:sponsor>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Publisher</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </schema:sponsor>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2021-01-30</dct:issued>
    <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/>
    <owl:sameAs rdf:resource="https://zenodo.org/record/5833442"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5833442</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <dct:relation rdf:resource="http://issn.org/resource/ISSN/2278-3075"/>
    <owl:sameAs rdf:resource="https://doi.org/10.35940/ijitee.C8338.0110321"/>
    <dct:description>&lt;p&gt;The phishing attack is one of the very common attacks deployed using the social engineering techniques. The attack tries to capture the victim&amp;rsquo;s personal and sensitive information to trick and can results in terms of financial and social reputation loss. In this presented work the main focus is to investigate the phishing techniques and their detection approaches. In this context first a review on recently contributed URL based phishing attack detection and prevision techniques is prepared. Further based on the suitable techniques a new data mining based model is proposed for implementation. The proposed model first take training on phish tank database URLs and then identify the similar pattern based URLs in two classes legitimate and phishing. First the dataset is preprocessed and the features are computed. The computed features are then transformed in terms of transactional database and association rules are prepared. To generate the association rules the apriori algorithm and FP-Tree algorithm is employed. Based on conducted experiments, the performance the FP-Tree based classification technique much efficient and accurate as compared to apriori algorithm, because the apriori algorithm is much time expensive then the FP-Tree. Finally the future extension of the work is also suggested.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL rdf:resource="https://doi.org/10.35940/ijitee.C8338.0110321"/>
        <dcat:byteSize>778303</dcat:byteSize>
        <dcat:downloadURL rdf:resource="https://zenodo.org/record/5833442/files/C83380110321.pdf"/>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
</rdf:RDF>
35
14
views
downloads
Views 35
Downloads 14
Data volume 10.9 MB
Unique views 28
Unique downloads 14

Share

Cite as