Please use this identifier to cite or link to this item: http://210.212.227.212:8080/xmlui/handle/123456789/268
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKajal K, Nair-
dc.contributor.authorManu, J Pillai-
dc.date.accessioned2022-11-09T06:10:41Z-
dc.date.available2022-11-09T06:10:41Z-
dc.date.issued2022-09-
dc.identifier.urihttp://210.212.227.212:8080/xmlui/handle/123456789/268-
dc.description.abstractPhishing websites are the ones with same name and appearance as an offi cial website. Nowadays, URL phishing is increasing and are causing great threats, they pretend to be the same as the official website and steal user information. Earlier blacklists were used to identify these URLs; however, they cannot identify the one-time Uniform Resource Locators (URL). Deep learning methods are employed to avoid such risks and also to improve the detection accuracy and decrease the misjudgment ratio. In URL detection using residual pipelining, the common URL features along with some senti mental values are extracted and fed onto a residual pipeline. The residual pipeline consists of convolutional blocks and inverted residual blocks. The result obtained from this block is finally passed onto the MLP output layer where the actual detection and classification of an URL takes place. The dataset is obtained from Kaggle. The accuracy, precision, F1 score, and re call are being measured and it is observed that it is much higher than those of several other traditional algorithmsen_US
dc.language.isoenen_US
dc.relation.ispartofseries;TKM20CSCE08-
dc.titlePHISHING URL DETECTION USING RESIDUAL PIPELININGen_US
dc.typeTechnical Reporten_US
Appears in Collections:2022

Files in This Item:
File Description SizeFormat 
TKM20CSCE08.pdf549.73 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.