Detection of Malicious URLs using Artificial Intelligence
Monisha.T, Sridevi.R, Tirumalini.K.R, ,
Affiliations Computer Science and Engineering, S.A. Engineering College, Anna University, Chennai, India
Background/Objectives: The main objective of the project is to avoid various security threats and network attacks by detecting malicious Uniform Resource Locator(URL) based on the keyword text classification.
Methods/Statistical analysis: A semi-supervised technique, naive Bayes classification is proposed to locate malicious URL by text classification phenomena. The probabilities of the predicted and the exact values are calculated, and it results with high probability. With more accuracy, the malignant URL is predicted. A page rank algorithm is used to detect the blacklist which contains the URLs that are already noted as spam, malware or phishing URL.
Findings: With the persistent improvement of Web assaults, many web applications have been languishing from different types of security dangers and system assaults. The security identification of URLs has consistently been the focal point of Web security. One of the main sources of attacks is via malicious URLs; the attackers may send embedding executable codes or injects malicious codes through these URLs. Thus, it is important to improve the unwavering quality and security of web applications by precisely identifying malignant URLs. The utilization of profound figuring out how to group URLs to recognize Web guests' aims has significant hypothetical and scientific values for Web security investigate, giving new plans to canny security discovery.
Monisha.T,Sridevi.R,Tirumalini.K.R."Detection of Malicious URLs using Artificial Intelligence". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 08,pp.6-10, August - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I802.pdf,
 Surendra Sedhai; AixinSun" Semi-Supervised Spam Detection in Twitter Stream" IEEE Transactions on Computational Social Systems (Volume: 5, Issue: 1, March 2018)
 Bo Feng; Qiang Fu; Mianxiong Dong; Dong Guo; Qiang Li "Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning"IEEE Network ( Volume: 32 , Issue: 4 , July/August 2018 )
 Jonghyuk Song; Sangho Lee; Jong Kim " Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata" IEEE Transactions on Dependable and Secure Computing (Volume: 13, Issue: 3, May-June 1 2016)
 Longfei Wu; Xiaojiang Du; JieWu" Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms" IEEE Transactions on Vehicular Technology (Volume: 65, Issue: 8, Aug. 2016)
 Eric Lancaster ; TanmoyChakraborty ; V. S. Subrahmanian"MALTP : Parallel Prediction of Malicious Tweets"IEEE Transactions on Computational Social Systems( Volume: 5 , Issue: 4 , Dec. 2018 )
 Hong Zhao; Zhaobin Chang; Weijie Wang; XiangyanZeng" Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification" IEEE Access (Volume: 7)
 Xuanzhe Liu ; Yun Ma ; Xinyang Wang ; Yunxin Liu ; Tao Xie ; Gang Huang"SWAROVsky: Optimizing Resource Loading for Mobile Web Browsing"IEEETransactions on Mobile Computing( Volume: 16 , Issue: 10 , Oct. 1 2017 )
 DohoonKim" Potential Risk Analysis Method for Malware Distribution Networks" IEEE Access (Volume: 7)
 JoostBerkhout"Google's PageRank algorithm for ranking nodes in general networks"IEEE 2016 13th International Workshop on Discrete Event Systems (WODES)
 Zhou Hao; PuQiumei; Zhang Hong; ShaZhihao"An Improved PageRank Algorithm Based on Web Content" IEEE 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)
 Yuguang Huang ; Lei Li"Naive Bayes classification algorithm based on small sample set" IEEE 2011 IEEE International Conference on Cloud Computing and Intelligence Systems
 HaiyiZhang; Di Li"Naïve Bayes Text Classifier" IEEE 2007 IEEE International Conference on Granular Computing (GRC 2007)
 Mohammed Al-Janabi: Ed de Quincey: Peter Andras: “Using supervised machine learning algorithms to detect suspicious URLs in online social networks” 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
 Justin Ma: Lawrence K. Saul: Stefan Savage: Geoffrey M. Voelker:“Identifying Suspicious URLs: An Application of Large-Scale Online Learning” 26th International Conference on Machine Learning, Montreal, Canada, 2009.
 Training Datasets:
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.