
URL Scrutiny to Circumvent Phishing
Author(s) -
P. Mahalakshmi,
Bharat Motwani,
Akhil Bajpai
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1362/1/012126
Subject(s) - phishing , computer security , identity theft , computer science , scrutiny , hacker , internet privacy , identity (music) , world wide web , the internet , law , physics , political science , acoustics
Increasing the number of cyber-crimes and frauds it has become the need of hour to seriously consider the threat and make some solid security arrangement against it. The links or Uniform Resource locator (URL) can be classified as benign, spam or malicious thus informing the user beforehand about its safety. As emails are hook to attach malicious URL, luring to catch the users. Malicious URL are the most common tool used in breaking identity and attacking either the system database or some financial frauds. Instead of focusing the source of such links if the rigorous testing on various attributes is performed on the URL itself using Random forest algorithm for threat detection and Support Vector Machine (SVM) to consider even the extreme cases is expected to improve the coverage and thus can provide the system user with high level security from counterfeited URL.