Comparative Analysis of the Performance of Selected Learning Algorithms for Verification of vulnerable and Compromised Uniform Resource Locators (URLs)

dc.contributor.authorAzeez, N.A
dc.contributor.authorAjayi, A.D
dc.contributor.authorYinka-Banjo, C.O
dc.date.accessioned2019-02-12T20:54:18Z
dc.date.available2019-02-12T20:54:18Z
dc.date.issued2018
dc.description.abstractThe fact that cybercriminals have caused serious havoc and unprecedented financial loss through internet activities is well acknowledged by internet users across the globe. Different nefarious activities of the internet fraudsters have undoubtedly resulted in monumental loss of life and property of immeasurable values. From available literatures, many people have become victims of their handiworks by giving feedback to fake and phony Uniform Resource Locators (URLs) sent to their electronic mails. In the recent works by researchers in the area of cybersecurity, it has been established that machine learning approaches have been proposed to identify various compromised and fake URLs in order to safeguard internet users from becoming victim. Consequently, discrepancies noted in some the available results give room for doubt and reliability of the results obtained in their experimentations. In an attempt, however to protect internet users from experiencing further loss and to establish the performances of these algorithms, the authors carried out a comparative analysis of three learning algorithms (Na¨ıve Bayes, Decision Tree and Logistics Regression Model) for verification of compromised, phony and fake URLs and determined which is the best of all the three based on the metrics (F-Measure, Precision and Recall) used for evaluation. After the experimentation, it was finally observed that the decision tree provides optimal and efficient solution of all the tree algorithms with full and absolute F-Measure when 0.6 is considered as boundary. With optimal solution provided by the decision tree, internet users can be given reliable information and consequently be guarded against further attacks.en_US
dc.identifier.citationN.A Azeez, A.D Ajayi and C.O Yinka-Banjo (2018) “Comparative Analysis of the performance of Learning Algorithms for Verification of Vulnerable and Compromised URLs” International Science and Technology Journal of Namibia (ISTJN), University of Namibia, ISTJN 2018, vol.12, pp 3-17.en_US
dc.identifier.issn2026-7673
dc.identifier.urihttps://ir.unilag.edu.ng/handle/123456789/3721
dc.language.isoenen_US
dc.publisherInt. Sci. Technol. J. Namibiaen_US
dc.subjectAlgorithms, Vulnerable URL, Compromised URL, performance analysis, metrics, cybercriminals, victims, optimal solutionen_US
dc.titleComparative Analysis of the Performance of Selected Learning Algorithms for Verification of vulnerable and Compromised Uniform Resource Locators (URLs)en_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
COMPARATIVE ANALYSIS OF THE PERFORMANCE OF SELECTED LEARNING AL.pdf
Size:
4.42 MB
Format:
Adobe Portable Document Format
Description:
Main article
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: