SeizeMaliciousURL: A novel learning approach to detect malicious URLs
Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effect...
Ausführliche Beschreibung
Autor*in: |
Mondal, Dipankar Kumar [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021transfer abstract |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications - Khadilkar, Aditi ELSEVIER, 2014, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:62 ; year:2021 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.jisa.2021.102967 |
---|
Katalog-ID: |
ELV055583253 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV055583253 | ||
003 | DE-627 | ||
005 | 20230626041846.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220105s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.jisa.2021.102967 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica |
035 | |a (DE-627)ELV055583253 | ||
035 | |a (ELSEVIER)S2214-2126(21)00179-4 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 660 |q VZ |
082 | 0 | 4 | |a 630 |a 640 |a 580 |q VZ |
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 42.00 |2 bkl | ||
100 | 1 | |a Mondal, Dipankar Kumar |e verfasserin |4 aut | |
245 | 1 | 0 | |a SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
264 | 1 | |c 2021transfer abstract | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. | ||
520 | |a Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. | ||
650 | 7 | |a Malicious URLs detection |2 Elsevier | |
650 | 7 | |a Machine learning |2 Elsevier | |
650 | 7 | |a Classification |2 Elsevier | |
700 | 1 | |a Singh, Bikash Chandra |4 oth | |
700 | 1 | |a Hu, Haibo |4 oth | |
700 | 1 | |a Biswas, Shivazi |4 oth | |
700 | 1 | |a Alom, Zulfikar |4 oth | |
700 | 1 | |a Azim, Mohammad Abdul |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Khadilkar, Aditi ELSEVIER |t Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |d 2014 |g Amsterdam [u.a.] |w (DE-627)ELV028549872 |
773 | 1 | 8 | |g volume:62 |g year:2021 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.jisa.2021.102967 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-BIODIV | ||
912 | |a GBV_ILN_99 | ||
912 | |a GBV_ILN_165 | ||
936 | b | k | |a 42.00 |j Biologie: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 62 |j 2021 |h 0 |
author_variant |
d k m dk dkm |
---|---|
matchkey_str |
mondaldipankarkumarsinghbikashchandrahuh:2021----:ezmlcosraoelannapoctdt |
hierarchy_sort_str |
2021transfer abstract |
bklnumber |
42.00 |
publishDate |
2021 |
allfields |
10.1016/j.jisa.2021.102967 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica (DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Mondal, Dipankar Kumar verfasserin aut SeizeMaliciousURL: A novel learning approach to detect malicious URLs 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier Singh, Bikash Chandra oth Hu, Haibo oth Biswas, Shivazi oth Alom, Zulfikar oth Azim, Mohammad Abdul oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:62 year:2021 pages:0 https://doi.org/10.1016/j.jisa.2021.102967 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 62 2021 0 |
spelling |
10.1016/j.jisa.2021.102967 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica (DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Mondal, Dipankar Kumar verfasserin aut SeizeMaliciousURL: A novel learning approach to detect malicious URLs 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier Singh, Bikash Chandra oth Hu, Haibo oth Biswas, Shivazi oth Alom, Zulfikar oth Azim, Mohammad Abdul oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:62 year:2021 pages:0 https://doi.org/10.1016/j.jisa.2021.102967 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 62 2021 0 |
allfields_unstemmed |
10.1016/j.jisa.2021.102967 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica (DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Mondal, Dipankar Kumar verfasserin aut SeizeMaliciousURL: A novel learning approach to detect malicious URLs 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier Singh, Bikash Chandra oth Hu, Haibo oth Biswas, Shivazi oth Alom, Zulfikar oth Azim, Mohammad Abdul oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:62 year:2021 pages:0 https://doi.org/10.1016/j.jisa.2021.102967 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 62 2021 0 |
allfieldsGer |
10.1016/j.jisa.2021.102967 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica (DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Mondal, Dipankar Kumar verfasserin aut SeizeMaliciousURL: A novel learning approach to detect malicious URLs 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier Singh, Bikash Chandra oth Hu, Haibo oth Biswas, Shivazi oth Alom, Zulfikar oth Azim, Mohammad Abdul oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:62 year:2021 pages:0 https://doi.org/10.1016/j.jisa.2021.102967 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 62 2021 0 |
allfieldsSound |
10.1016/j.jisa.2021.102967 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica (DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Mondal, Dipankar Kumar verfasserin aut SeizeMaliciousURL: A novel learning approach to detect malicious URLs 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier Singh, Bikash Chandra oth Hu, Haibo oth Biswas, Shivazi oth Alom, Zulfikar oth Azim, Mohammad Abdul oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:62 year:2021 pages:0 https://doi.org/10.1016/j.jisa.2021.102967 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 62 2021 0 |
language |
English |
source |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:62 year:2021 pages:0 |
sourceStr |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:62 year:2021 pages:0 |
format_phy_str_mv |
Article |
bklname |
Biologie: Allgemeines |
institution |
findex.gbv.de |
topic_facet |
Malicious URLs detection Machine learning Classification |
dewey-raw |
660 |
isfreeaccess_bool |
false |
container_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
authorswithroles_txt_mv |
Mondal, Dipankar Kumar @@aut@@ Singh, Bikash Chandra @@oth@@ Hu, Haibo @@oth@@ Biswas, Shivazi @@oth@@ Alom, Zulfikar @@oth@@ Azim, Mohammad Abdul @@oth@@ |
publishDateDaySort_date |
2021-01-01T00:00:00Z |
hierarchy_top_id |
ELV028549872 |
dewey-sort |
3660 |
id |
ELV055583253 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV055583253</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626041846.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220105s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2021.102967</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV055583253</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(21)00179-4</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mondal, Dipankar Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SeizeMaliciousURL: A novel learning approach to detect malicious URLs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious URLs detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Machine learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Classification</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Bikash Chandra</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hu, Haibo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Biswas, Shivazi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alom, Zulfikar</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azim, Mohammad Abdul</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:62</subfield><subfield code="g">year:2021</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2021.102967</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">62</subfield><subfield code="j">2021</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Mondal, Dipankar Kumar |
spellingShingle |
Mondal, Dipankar Kumar ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier Malicious URLs detection Elsevier Machine learning Elsevier Classification SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
authorStr |
Mondal, Dipankar Kumar |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV028549872 |
format |
electronic Article |
dewey-ones |
660 - Chemical engineering 630 - Agriculture & related technologies 640 - Home & family management 580 - Plants (Botany) |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl SeizeMaliciousURL: A novel learning approach to detect malicious URLs Malicious URLs detection Elsevier Machine learning Elsevier Classification Elsevier |
topic |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier Malicious URLs detection Elsevier Machine learning Elsevier Classification |
topic_unstemmed |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier Malicious URLs detection Elsevier Machine learning Elsevier Classification |
topic_browse |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier Malicious URLs detection Elsevier Machine learning Elsevier Classification |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
b c s bc bcs h h hh s b sb z a za m a a ma maa |
hierarchy_parent_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
hierarchy_parent_id |
ELV028549872 |
dewey-tens |
660 - Chemical engineering 630 - Agriculture 640 - Home & family management 580 - Plants (Botany) |
hierarchy_top_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV028549872 |
title |
SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
ctrlnum |
(DE-627)ELV055583253 (ELSEVIER)S2214-2126(21)00179-4 |
title_full |
SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
author_sort |
Mondal, Dipankar Kumar |
journal |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
journalStr |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology 500 - Science |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Mondal, Dipankar Kumar |
container_volume |
62 |
class |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Mondal, Dipankar Kumar |
doi_str_mv |
10.1016/j.jisa.2021.102967 |
dewey-full |
660 630 640 580 |
title_sort |
seizemaliciousurl: a novel learning approach to detect malicious urls |
title_auth |
SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
abstract |
Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. |
abstractGer |
Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. |
abstract_unstemmed |
Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 |
title_short |
SeizeMaliciousURL: A novel learning approach to detect malicious URLs |
url |
https://doi.org/10.1016/j.jisa.2021.102967 |
remote_bool |
true |
author2 |
Singh, Bikash Chandra Hu, Haibo Biswas, Shivazi Alom, Zulfikar Azim, Mohammad Abdul |
author2Str |
Singh, Bikash Chandra Hu, Haibo Biswas, Shivazi Alom, Zulfikar Azim, Mohammad Abdul |
ppnlink |
ELV028549872 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth oth |
doi_str |
10.1016/j.jisa.2021.102967 |
up_date |
2024-07-06T17:56:58.293Z |
_version_ |
1803853358217297920 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV055583253</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626041846.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220105s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2021.102967</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001553.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV055583253</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(21)00179-4</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mondal, Dipankar Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SeizeMaliciousURL: A novel learning approach to detect malicious URLs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malicious websites are increasing in abundance, which brings serious web security threats to users. As a result, individuals lose their assets, values, information, etc. to unauthorized parties and become victims while visiting such websites. The research community put efforts into developing effective and efficient models for detecting malicious URLs to make available notifications about websites that users access. Perceiving this, numerous methods make use of various types of machine learning (ML) approaches. However, until now, no technique has perfectly detected malicious URLs, as they are susceptible to false positive and false negative decisions in classifying URLs in malicious and non-malicious groups. To improve this issue, this article proposes a new approach based on a machine learning technique. The proposed approach uses multiple classifiers (i.e., ensemble learning) to predict the class probabilities of URLs and then applies a threshold to filter the decisions of multiple classifiers. Next, the decisions are combined concerning its corresponding class probabilities and find the class label with the highest class probability as the final decision on unlabeled URLs. The results show that the proposed method offers better performance in terms of malicious URL detection than other methods.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious URLs detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Machine learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Classification</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Bikash Chandra</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hu, Haibo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Biswas, Shivazi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alom, Zulfikar</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azim, Mohammad Abdul</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:62</subfield><subfield code="g">year:2021</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2021.102967</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">62</subfield><subfield code="j">2021</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.3977537 |