Detection of malicious URLs in big data using RIPPER algorithm
dc.contributor.author | Thakur, S. | |
dc.contributor.author | Meenakshi, E. | |
dc.contributor.author | Priya, A. | |
dc.date.accessioned | 2018-07-14T01:18:40Z | |
dc.date.accessioned | 2024-08-14T05:05:40Z | |
dc.date.available | 2018-07-14T01:18:40Z | |
dc.date.available | 2024-08-14T05:05:40Z | |
dc.date.issued | 2018 | |
dc.description.abstract | 'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is stored in Big Data in the form of both structured and unstructured therefore, big data cannot be processed using database queries like SQL queries. In big data, malicious URLs have become a station for internet criminal activities such as drive-by-download, information warfare, spamming and phishing. Malicious URLs detection techniques can be classified into Non-Machine Learning (e.g. blacklisting) and Machine learning approach (e.g. data mining techniques). Data mining helps in the analysis of large and complex datasets in order to detect common patterns or learn new things. Big data is the collection of large and complex datasets and the processing of these datasets can be done either by using tool like Hadoop or data mining algorithms. Data mining techniques can generate classification models which is used to manage data, modelling of data that helps to make prediction about whether it is malicious or legitimate. In this paper analysis of RIPPER i.e. JRip data mining algorithm has been done using WEKA tool. A training dataset of 6000 URLs has been made to train the JRip algorithm which is an implementation of RIPPER algorithm in WEKA. Training dataset will generate a model which is used to predict the testing dataset of 1050 URLs. Accuracy are calculated after testing process. Result shows JRip has an accuracy of 82%. ? 2017 IEEE. | en_US |
dc.identifier.citation | Thakur, S., Meenakshi, E., & Priya, A. (2018). Detection of malicious URLs in big data using RIPPER algorithm. Paper presented at the RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings. | en_US |
dc.identifier.doi | 10.1109/RTEICT.2017.8256808 | |
dc.identifier.isbn | 978-1-5090-3704-9 | |
dc.identifier.isbn | 978-1-5090-3705-6 | |
dc.identifier.uri | https://kr.cup.edu.in/handle/32116/1291 | |
dc.identifier.url | https://ieeexplore.ieee.org/document/8256808/ | |
dc.language.iso | en_US | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.subject | Artificial intelligence | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Computer system firewalls | en_US |
dc.subject | Data mining | en_US |
dc.subject | Digital storage | en_US |
dc.subject | Learning systems | en_US |
dc.subject | Military photography | en_US |
dc.subject | Network security | en_US |
dc.subject | Query languages | en_US |
dc.subject | Statistical tests | en_US |
dc.subject | Accuracy | en_US |
dc.subject | False negative rate | en_US |
dc.subject | False positive rates | en_US |
dc.subject | JRip | en_US |
dc.subject | True negative rates | en_US |
dc.subject | True positive rates | en_US |
dc.subject | Weka | en_US |
dc.subject | Big data | en_US |
dc.title | Detection of malicious URLs in big data using RIPPER algorithm | en_US |
dc.title.journal | RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings | en_US |
dc.type | Conference Paper | en_US |