:::

詳目顯示

回上一頁
題名:融合多源網絡評估數據及URL特徵的釣魚網站識別技術研究
書刊名:數據分析與知識發現
作者:胡忠義王超群吳江
出版日期:2017
卷期:2017(6)
頁次:47-55
主題關鍵詞:數據挖掘釣魚網站識別機器學習Data miningPhishing websites identificationMachine learning
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:62
【目的】充分利用多源網絡評估數據和URL異常特征數據,研究提高釣魚網站識別準確性的可行性方案。【方法】采用8種機器學習技術,對比研究網絡評估數據與傳統的URL異常特征數據在釣魚網站識別中的性能,并融合兩類數據研究進一步提高釣魚網站識別準確性的可行性方案。【結果】在釣魚網站識別中,相比于傳統的URL異常特征,利用網絡評估數據可以取得更好的識別效果。融合兩類數據對于提高識別準確性有一定幫助。【局限】未考慮釣魚網站與正常網站的數量存在嚴重的不均衡問題。【結論】充分利用多源網絡評估數據和URL異常特征數據識別釣魚網站的方法是比較合理和有效的,對后續相關研究具有一定的借鑒意義。
[Objective] This study aims to identify phishing websites more effectively with the help of online evaluation data and URL abnormal features. [Methods] First, we used eight machine learning techniques to compare the performance of various online evaluation data and URL abnormal features in identifying phishing websites. Then, we proposed a new method to improve the accuracy of the identification procedures. [Results] We found that the evaluation data had better performance than abnormal features of URL. Combining the two data sets could improve the identification performance. [Limitations] We did not consider the difference between the numbers of phishing sites and the good ones. [Conclusions] Online evaluation data and URL abnormal features could help us identify phishing websites effectively, which indicates the direction of future studies.
期刊論文
1.Freund, Yoav、Schapire, Robert E.(1997)。A Decision-theoretic Generalization of On-line Learning and an Application to Boosting。Journal of Computer and System Sciences,55(1),119-139。  new window
2.Kursa, M. B.、Rudnicki, W. R.(2010)。Feature Selection with the Boruta Package。Journal of Statistical Software,36(11),1-13。  new window
3.Lo, S. L.、Chiong, R.、Cornforth, D.(2015)。Using Support Vector Machine Ensembles for Target Audience Classification on Twitter。PLoS One,10(3),417-434。  new window
4.Bayes, T.、Price, R.、Canton, J.(2003)。An Essay Towards Solving a Problem in the Doctrine of Chances。Resonance,8(4),80-88。  new window
5.黃華軍、錢亮、王耀鈞(2012)。基於異常特徵的釣魚網站URL檢測技術。信息網絡安全,2012(1),23-25。  延伸查詢new window
6.曾傳璜、李思強、張小紅(2015)。基於AdaCostBoost算法的網絡釣魚檢測。計算機系統應用,24(9),129-133。  延伸查詢new window
7.顧曉清、王洪元、倪彤光(2015)。基於貝葉斯和支持向量機的釣魚網站檢測方法。計算機工程與應用,51(4),87-90。  延伸查詢new window
8.Breiman, Leo(2001)。Random Forests。Machine Learning,45(1),5-32。  new window
會議論文
1.Sheng, S.、Weidman, B.、Warner, G.(2009)。An Empirical Analysis of Phishing Blacklists。The 6th Conference on Email and Anti-Spam。California。112-118。  new window
2.Zhang, Y.、Egelman, S.、Cranor, L.(2007)。Phinding Phish: Evaluating Anti-phishing Tools。The 14th Annual Network and Distributed System Security Symposium,381-192。  new window
3.Blum, A.、Warden, B.、Solaria, T.(2010)。Lexical Feature Based Phishing URL Detection Using Online Learning。The ACM Workshop on Artificial Intelligence & Security,54-60。  new window
4.Ma, J.、Saul, L. K.、Savage, S.(2009)。Identifying Suspicious URLs: An Application of Large-scale Online Learning。The 26th Annual International Conference on Machine Learning。ACM。681-688。  new window
5.Ma, J.、Saul, L. K.、Savage, S.(2009)。Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs。The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining。ACM。1245-1254。  new window
6.Thomas, K.、Grier, C.、Ma, J.(2011)。Design and Evaluation of a Real-time URL Spam Filtering Service。The 2011 IEEE Symposium on Security and Privacy。Berkeley, California。376-382。  new window
7.Hu, Z.、Chiong, R.、Pranata, I.(2016)。Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data。The 2016 IEEE Congress on Evolutionary Computation。Vancouver, British Columbia。5186-5194。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top