Malicious Uniform Resource Locator Detection Using Wolf Optimization Algorithm and Random Forest Classifier

dc.contributor.authorAdewole, K. S.
dc.contributor.authorRaheem, M. O.
dc.contributor.authorAbikoye, O. C.
dc.contributor.authorAjiboye, A. R.
dc.contributor.authorOladele, Tinuke Omolewa
dc.contributor.authorJimoh, M. K.
dc.contributor.authorAremu, D. R.
dc.date.accessioned2023-05-12T12:43:34Z
dc.date.available2023-05-12T12:43:34Z
dc.date.issued2021
dc.description.abstractWithin the multitude of security challenges facing the online community, malicious websites play a critical role in today’s cybersecurity threats. Malicious URLs can be delivered to users via emails, textmessages, pop-ups or advertisements. To recognize these malicious websites, blacklisting services have been created by the web security community. This method has been proven to be inefficient. This chapter proposed meta-heuristic optimization method for malicious URLs detection based on genetic algorithm (GA) and wolf optimization algorithm (WOA). Support vector machine (SVM) as well as random forest (RF) were used for classification of phishingweb pages. Experimental results showthatWOAreduced model complexity with comparable classification results without feature subset selection. RF classifier outperforms SVM based on the evaluation conducted. RF model without feature selection produced accuracy and ROC of 0.972 and 0.993, respectively, while RF model that is based onWOA optimization algorithm produced accuracy of 0.944 and ROC of 0.987. Hence, in view of the experiments conducted using two well-known phishing datasets, this research shows that WOA can produce promising results for phishing URLs detection task.en_US
dc.identifier.urihttps://uilspace.unilorin.edu.ng/handle/20.500.12484/10172
dc.language.isoenen_US
dc.publisherMachine Learning and Data Mining for Emerging Trend in Cyber Dynamics: Theories and Applicationsen_US
dc.subjectPhishing detection, Meta-heuristic, Genetic algorithm, Wolf optimization, Machine learningen_US
dc.titleMalicious Uniform Resource Locator Detection Using Wolf Optimization Algorithm and Random Forest Classifieren_US
dc.typeBook chapteren_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Malicious Uniform Resource Locator Detection using WoA and RF (2).pdf
Size:
783.58 KB
Format:
Adobe Portable Document Format
Description:
Main Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections