极限学习机(ELM)分类在钓鱼网站检测中的应用

M. R. Ridho, H. Nuha
{"title":"极限学习机(ELM)分类在钓鱼网站检测中的应用","authors":"M. R. Ridho, H. Nuha","doi":"10.1109/IC2IE56416.2022.9970191","DOIUrl":null,"url":null,"abstract":"Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like accessing a site from an official website. In overcoming the many phishing sites that exist in this study, the Extreme Learning Machine (ELM) classification method is used because ELM is one of the algorithms that is often used in classification and regression in machine learning. In this study, the accuracy value obtained from the test which was repeated 10 times was between 82-84% and the time between 5–11 $s$ with the best accuracy of 84.02% with a time of 7.98 $s$, the accuracy results generated from the ELM algorithm are indeed not very good. This large amount occurs because of the overfitting experienced by the formed classification model so that the false positives obtained are quite large. Referring to the dataset itself, the most influential feature or attribute in the labeling of phishing sites is the time domain expires, if the time domain expires has reached 200 days then the site has a phishing site label. In this study, ELM was compared with several other machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes and Decision Tree.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Application of Extreme Learning Machine (ELM) Classification in Detecting Phishing Sites\",\"authors\":\"M. R. Ridho, H. Nuha\",\"doi\":\"10.1109/IC2IE56416.2022.9970191\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like accessing a site from an official website. In overcoming the many phishing sites that exist in this study, the Extreme Learning Machine (ELM) classification method is used because ELM is one of the algorithms that is often used in classification and regression in machine learning. In this study, the accuracy value obtained from the test which was repeated 10 times was between 82-84% and the time between 5–11 $s$ with the best accuracy of 84.02% with a time of 7.98 $s$, the accuracy results generated from the ELM algorithm are indeed not very good. This large amount occurs because of the overfitting experienced by the formed classification model so that the false positives obtained are quite large. Referring to the dataset itself, the most influential feature or attribute in the labeling of phishing sites is the time domain expires, if the time domain expires has reached 200 days then the site has a phishing site label. In this study, ELM was compared with several other machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes and Decision Tree.\",\"PeriodicalId\":151165,\"journal\":{\"name\":\"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC2IE56416.2022.9970191\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC2IE56416.2022.9970191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

网络钓鱼网站是由网络犯罪分子创建的尽可能接近真实网站的网站,通过将其伪装成从官方网站访问网站来欺骗互联网用户。在克服本研究中存在的许多网络钓鱼站点时,使用了极限学习机(ELM)分类方法,因为ELM是机器学习中经常用于分类和回归的算法之一。在本研究中,重复10次的测试得到的准确率值在82-84%之间,时间在5-11 $s$之间,最佳准确率为84.02%,时间为7.98 $s$, ELM算法产生的准确率结果确实不是很好。之所以出现如此大的数量,是因为所形成的分类模型经历了过拟合,从而得到了相当大的误报。就数据集本身而言,钓鱼网站标签中影响最大的特征或属性是时间域过期,如果时间域过期达到200天,则该网站具有钓鱼网站标签。在本研究中,ELM与其他几种机器学习算法如支持向量机(SVM)、朴素贝叶斯和决策树进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Application of Extreme Learning Machine (ELM) Classification in Detecting Phishing Sites
Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like accessing a site from an official website. In overcoming the many phishing sites that exist in this study, the Extreme Learning Machine (ELM) classification method is used because ELM is one of the algorithms that is often used in classification and regression in machine learning. In this study, the accuracy value obtained from the test which was repeated 10 times was between 82-84% and the time between 5–11 $s$ with the best accuracy of 84.02% with a time of 7.98 $s$, the accuracy results generated from the ELM algorithm are indeed not very good. This large amount occurs because of the overfitting experienced by the formed classification model so that the false positives obtained are quite large. Referring to the dataset itself, the most influential feature or attribute in the labeling of phishing sites is the time domain expires, if the time domain expires has reached 200 days then the site has a phishing site label. In this study, ELM was compared with several other machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes and Decision Tree.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信