Detection of malicious URLs in big data using RIPPER algorithm

dc.contributor.authorThakur, S.
dc.contributor.authorMeenakshi, E.
dc.contributor.authorPriya, A.
dc.date.accessioned2018-07-14T01:18:40Z
dc.date.accessioned2024-08-14T05:05:40Z
dc.date.available2018-07-14T01:18:40Z
dc.date.available2024-08-14T05:05:40Z
dc.date.issued2018
dc.description.abstract'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is stored in Big Data in the form of both structured and unstructured therefore, big data cannot be processed using database queries like SQL queries. In big data, malicious URLs have become a station for internet criminal activities such as drive-by-download, information warfare, spamming and phishing. Malicious URLs detection techniques can be classified into Non-Machine Learning (e.g. blacklisting) and Machine learning approach (e.g. data mining techniques). Data mining helps in the analysis of large and complex datasets in order to detect common patterns or learn new things. Big data is the collection of large and complex datasets and the processing of these datasets can be done either by using tool like Hadoop or data mining algorithms. Data mining techniques can generate classification models which is used to manage data, modelling of data that helps to make prediction about whether it is malicious or legitimate. In this paper analysis of RIPPER i.e. JRip data mining algorithm has been done using WEKA tool. A training dataset of 6000 URLs has been made to train the JRip algorithm which is an implementation of RIPPER algorithm in WEKA. Training dataset will generate a model which is used to predict the testing dataset of 1050 URLs. Accuracy are calculated after testing process. Result shows JRip has an accuracy of 82%. ? 2017 IEEE.en_US
dc.identifier.citationThakur, S., Meenakshi, E., & Priya, A. (2018). Detection of malicious URLs in big data using RIPPER algorithm. Paper presented at the RTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings.en_US
dc.identifier.doi10.1109/RTEICT.2017.8256808
dc.identifier.isbn978-1-5090-3704-9
dc.identifier.isbn978-1-5090-3705-6
dc.identifier.urihttps://kr.cup.edu.in/handle/32116/1291
dc.identifier.urlhttps://ieeexplore.ieee.org/document/8256808/
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.subjectArtificial intelligenceen_US
dc.subjectComputer crimeen_US
dc.subjectComputer system firewallsen_US
dc.subjectData miningen_US
dc.subjectDigital storageen_US
dc.subjectLearning systemsen_US
dc.subjectMilitary photographyen_US
dc.subjectNetwork securityen_US
dc.subjectQuery languagesen_US
dc.subjectStatistical testsen_US
dc.subjectAccuracyen_US
dc.subjectFalse negative rateen_US
dc.subjectFalse positive ratesen_US
dc.subjectJRipen_US
dc.subjectTrue negative ratesen_US
dc.subjectTrue positive ratesen_US
dc.subjectWekaen_US
dc.subjectBig dataen_US
dc.titleDetection of malicious URLs in big data using RIPPER algorithmen_US
dc.title.journalRTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedingsen_US
dc.typeConference Paperen_US

Files