Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/23181
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVANHOENSHOVEN, Frank-
dc.contributor.authorNAPOLES RUIZ, Gonzalo-
dc.contributor.authorFalcon, Rafaël-
dc.contributor.authorVANHOOF, Koen-
dc.contributor.authorKoeppen, Mario-
dc.date.accessioned2017-02-24T10:46:55Z-
dc.date.available2017-02-24T10:46:55Z-
dc.date.issued2016-
dc.identifier.citationProceedings of 2016 IEEE symposium series on computational intelligence (SSCI)-
dc.identifier.isbn9781509042401-
dc.identifier.urihttp://hdl.handle.net/1942/23181-
dc.description.abstractThe World Wide Web supports a wide range of criminal activities such as spam-advertised e-commerce, financial fraud and malware dissemination. Although the precise motivations behind these schemes may differ, the common denominator lies in the fact that unsuspecting users visit their sites. These visits can be driven by email, web search results or links from other web pages. In all cases, however, the user is required to take some action, such as clicking on a desired Uniform Resource Locator (URL). In order to identify these malicious sites, the web security community has developed blacklisting services. These blacklists are in turn constructed by an array of techniques including manual reporting, honeypots, and web crawlers combined with site analysis heuristics. Inevitably, many malicious sites are not blacklisted — either because they are too recent or were never or incorrectly evaluated. In this paper, we address the detection of malicious URLs as a binary classification problem and study the performance of several well-known classifiers, namely Na\"ive Bayes, Support Vector Machines, Multi-Layer Perceptron, Decision Trees, Random Forest and k-Nearest Neighbors. Furthermore, we adopted a public dataset comprising 2.4 million URLs (instances) and 3.2 million features. The numerical simulations have shown that most classification methods achieve acceptable prediction rates without requiring either advanced feature selection techniques or the involvement of a domain expert. In particular, Random Forest and Multi-Layer Perceptron attain the highest accuracy.-
dc.language.isoen-
dc.publisherIEEE eXpress Conference Publishing-
dc.rightsCopyright © 2016 by the Institute of Electrical and Electronic Engineers, Inc. All rights reserved.-
dc.titleDetecting Malicious URLs using Machine Learning Techniques-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedate06-09/12/2016-
local.bibliographicCitation.conferencename2016 IEEE Symposium Series on Computational Intelligence (SSCI 2016)-
local.bibliographicCitation.conferenceplaceAthens, Greece-
dc.identifier.epage8-
dc.identifier.spage1-
local.format.pages8-
local.bibliographicCitation.jcatC1-
dc.description.notesVanhoenshoven, F (reprint author), Univ Hasselt, Campus Dicpenbeek Agoralaan Gebouw D, BE-3590 Diepenbeek, Belgium. frank.vanhoenshoven@uhasselt.be; gonzalo.napoles@uhasselt.be; rfalcon@uottawa.ca; koen.vanhoof@uhasselt.be; mkoeppen@ieee.org-
local.publisher.placeNew York, NY, USA-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
dc.identifier.doi10.1109/SSCI.2016.7850079-
dc.identifier.isi000400488301120-
local.bibliographicCitation.btitleProceedings of 2016 IEEE symposium series on computational intelligence (SSCI),p. 1-8-
item.fulltextWith Fulltext-
item.accessRightsRestricted Access-
item.fullcitationVANHOENSHOVEN, Frank; NAPOLES RUIZ, Gonzalo; Falcon, Rafaël; VANHOOF, Koen & Koeppen, Mario (2016) Detecting Malicious URLs using Machine Learning Techniques. In: Proceedings of 2016 IEEE symposium series on computational intelligence (SSCI).-
item.validationecoom 2018-
item.contributorVANHOENSHOVEN, Frank-
item.contributorNAPOLES RUIZ, Gonzalo-
item.contributorFalcon, Rafaël-
item.contributorVANHOOF, Koen-
item.contributorKoeppen, Mario-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
url classification.pdf
  Restricted Access
Published version214.45 kBAdobe PDFView/Open    Request a copy
Show simple item record

SCOPUSTM   
Citations

15
checked on Sep 2, 2020

WEB OF SCIENCETM
Citations

18
checked on May 9, 2024

Page view(s)

68
checked on Sep 7, 2022

Download(s)

40
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.