Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification confidence weighted majority voting using decision tree classifiers

In this paper a novel method is proposed to combine decision tree classifiers using calculated classification confidence values. This confidence in the classification is based on distance calculation to the relevant decision boundary. It is shown that these values – provided by individual classification trees – can be integrated to derive a consensus decision. The proposed combination scheme – ...

متن کامل

Anomaly Detection using Decision Tree based Classifiers

as we know that with the help of Data mining techniques we can find out knowledge in terms of various characteristics and patterns. In this regard this paper presents finding out of anomalies/ outliers using various decision tree based classifiers viz. Best-first Decision Tree, Functional Tree, Logistic Model Tree, J48 and Random Forest decision tree. Three real world datasets has been used in ...

متن کامل

Learning based Malicious Web Sites Detection using Suspicious URLs

Malicious Web sites largely promote the growth of Internet criminal activities and constrain the development of Web services. As a result, there has been strong motivation to develop systemic solution to stopping the user from visiting such Web sites. In this paper, we propose a learning based approach to classifying Web sites into 3 classes: benign, phishing, and malware. Our mechanism only an...

متن کامل

Reputation-based Majority Voting for Malicious Grid Resources Tolerance

Recently, distributed computing infrastructures such as grid computing, have witnessed huge developments which have a very important impact on computationally intensive scientific, industrial and engineering problems. Collaborative computing, resources access and sharing facilitated by grid computing systems amplifies concerns about cyber attacks and misbehaviors of grid resources (resources pr...

متن کامل

A Decision Support System For Handwritten Numerals Using Majority Voting

Feature extraction is an important step of pattern recognition. This study uses profile based feature extraction and uses Simple Profile (with cropping and without cropping image samples), Contour based feature extraction for recognizing handwritten numerals. The features are computed by using 48 X 48 as a feature length classifier used Back propagation neural network for the classification.. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybernetics and Information Technologies

سال: 2018

ISSN: 1314-4081

DOI: 10.2478/cait-2018-0002