DSpace Repository

PHISHING URL DETECTION USING RESIDUAL PIPELINING

Show simple item record

dc.contributor.author Kajal K, Nair
dc.contributor.author Manu, J Pillai
dc.date.accessioned 2022-11-09T06:10:41Z
dc.date.available 2022-11-09T06:10:41Z
dc.date.issued 2022-09
dc.identifier.uri http://210.212.227.212:8080/xmlui/handle/123456789/268
dc.description.abstract Phishing websites are the ones with same name and appearance as an offi cial website. Nowadays, URL phishing is increasing and are causing great threats, they pretend to be the same as the official website and steal user information. Earlier blacklists were used to identify these URLs; however, they cannot identify the one-time Uniform Resource Locators (URL). Deep learning methods are employed to avoid such risks and also to improve the detection accuracy and decrease the misjudgment ratio. In URL detection using residual pipelining, the common URL features along with some senti mental values are extracted and fed onto a residual pipeline. The residual pipeline consists of convolutional blocks and inverted residual blocks. The result obtained from this block is finally passed onto the MLP output layer where the actual detection and classification of an URL takes place. The dataset is obtained from Kaggle. The accuracy, precision, F1 score, and re call are being measured and it is observed that it is much higher than those of several other traditional algorithms en_US
dc.language.iso en en_US
dc.relation.ispartofseries ;TKM20CSCE08
dc.title PHISHING URL DETECTION USING RESIDUAL PIPELINING en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account