A malicious URLs detection system using optimization and machine learning classifiers
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker performs the cyber-attacks on Web using malware Uniform Resource Locators (URLs) since it widely used by internet users. Therefore, a significant approach is required to detect malicious URLs and identify...
| Main Authors: | Lee, Ong Vienna, Heryanto, Ahmad, Mohd Faizal, Ab Razak, Anis Farihan, Mat Raffei, Eh Phon, Danakorn Nincarean, Shahreen, Kasim, Sutikno, Tole |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Advanced Engineering and Science
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40105/ http://umpir.ump.edu.my/id/eprint/40105/1/A%20malicious%20URLs%20detection%20system%20using%20optimization%20and%20machine.pdf |
Similar Items
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
Augmented reality: Effect on conceptual change of scientific
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
Factors affecting cyberbullying behaviours among university students: A review
by: Nur Shamsiah, Abdul Rahman, et al.
Published: (2023)
by: Nur Shamsiah, Abdul Rahman, et al.
Published: (2023)
Fusion iris and periocular recognitions in non-cooperative environment
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Comparison of feature selection techniques in classifying stroke documents
by: Nur Syaza Izzati, Mohd Rafei, et al.
Published: (2019)
by: Nur Syaza Izzati, Mohd Rafei, et al.
Published: (2019)
Mobile learning application impact towards student performance in programming subject
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
by: Nurul Farahah, Abdul Halim, et al.
Published: (2020)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
by: Abdulla, Saman Mirza
Published: (2012)
by: Abdulla, Saman Mirza
Published: (2012)
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Foodie – Homemade food ordering application for food business
by: Wei Chuan, Cheah, et al.
Published: (2021)
by: Wei Chuan, Cheah, et al.
Published: (2021)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Teacher's ICT skills and readiness of integrating augmented reality in education
by: Azrie, Salleh, et al.
Published: (2021)
by: Azrie, Salleh, et al.
Published: (2021)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Examining the correlations between teacher profiling, ICT skills, and the readiness of integrating augmented reality in education
by: Azrie, Salleh, et al.
Published: (2023)
by: Azrie, Salleh, et al.
Published: (2023)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
The effect of augmented reality on spatial visualization ability of elementary school student
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Self-organizing map (SOM) for species distribution modelling of birds species at Kenyir landscape
by: Salwana, Mohamad, et al.
Published: (2019)
by: Salwana, Mohamad, et al.
Published: (2019)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Mobile augmented reality in learning chemistry subject: an evaluation of science exploration
by: Noor Hidayah, Che Lah, et al.
Published: (2024)
by: Noor Hidayah, Che Lah, et al.
Published: (2024)
Dual image watermarking based on NSST-LWT-DCT for color image
by: Avivah, Siti Nur, et al.
Published: (2024)
by: Avivah, Siti Nur, et al.
Published: (2024)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
The design and development of a multimedia reading application for pre-schoolers as a foundation in the area of TVET
by: Suhaizal, Hashim, et al.
Published: (2025)
by: Suhaizal, Hashim, et al.
Published: (2025)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Iris Segmentation
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Multi-agent classifier system based on heterogeneous classifier
by: Nur Afiqah, Mohd Dali
Published: (2018)
by: Nur Afiqah, Mohd Dali
Published: (2018)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Reported malicious codes incident within Malaysia’s landscape: Time series modelling and a timeline analysis
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
Perception and adoption of digital technology in students’ data management: A case study of tasmik program
by: Husni, M., et al.
Published: (2022)
by: Husni, M., et al.
Published: (2022)
Rainfall-runoff modelling using adaptive neuro-fuzzy inference system
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
A managerial perspective on institutions' administration readiness to diffuse blended learning in higher education: concept and evidence
by: Bokolo, Anthony Jr., et al.
Published: (2020)
by: Bokolo, Anthony Jr., et al.
Published: (2020)
Similar Items
-
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023) -
Augmented reality: Effect on conceptual change of scientific
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019) -
Factors affecting cyberbullying behaviours among university students: A review
by: Nur Shamsiah, Abdul Rahman, et al.
Published: (2023) -
Fusion iris and periocular recognitions in non-cooperative environment
by: Anis Farihan, Mat Raffei, et al.
Published: (2019)