학술논문

Machine Learning based URL Analysis for Phishing Detection
Document Type
Conference
Source
2023 6th International Conference on Information Systems and Computer Networks (ISCON) Information Systems and Computer Networks (ISCON), 2023 6th International Conference on. :1-5 Mar, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineering Profession
Fields, Waves and Electromagnetics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Uniform resource locators
Radio frequency
Analytical models
Machine learning algorithms
Phishing
Software algorithms
Web pages
Artificial Intelligence
Machine learning
Decision Tree
Phishing Attack Detection.
Language
ISSN
2832-143X
Abstract
Attacks that take place online most frequently take the form of phishing scams. Attackers attempt to gather user data without the consent of any such user through emails, URLs, and any other link that sends a viewer to the a dubious page where a consumer is persuaded to start taking specific actions that can successfully complete an attack. An attacker has the opportunity to gather vital information about the victim during these attacks, which they can use to presume the victim’s identity & carry out tasks that only the victim should have been able to carry out, such as making purchases, sending messages to the other people, and simply attempting to access the victim’s info. Many studies have been done to discuss potential defenses against these assaults. This study employs three algorithms for machine learning to ascertain whether such a web page is phishing. In the experiment, software that analyzes web page URLs to distinguish between legitimate & phishing websites is used to try to prevent attacks using these models which have been trained to utilize URL-based features. The accuracy, recall, and F1 Score of the random forest classifier’s performance from the observations were 97.5%, 99.1%, and 97.3%, respectively. The proposed model is quick and effective because, unlike earlier studies, it only relies on the URL and doesn’t conduct analysis using any other sources.