Detecting Malicious and Compromised URLs in E-Mails Using Association Rule

dc.date.accessioned2019-08-31T17:45:56Z
dc.date.available2019-08-31T17:45:56Z
dc.date.issued2017
dc.description.abstractThe rate of cybercrime is on the rise as more people embrace technology in their different spheres of live. Hackers are daily exploiting the anonymity and speed which the internet offers to lure unsuspecting victims into disclosing personal and confidential information through social engineering, phishing mails and sites and promises of great rewards which are never received. Thus resulting in great loss of property, finances, life, etc. and harm to their victims. This research work seeks to evaluate ways of protecting users from malicious Uniform Resource Locators (URLs) embedded in the emails they receive. The aim is to evaluate ways of identifying malicious URLs in emails by classifying them based on their lexical and hostname features. This study is conducted by extracting features from URLs sourced from phishing tank and DMOZ and adopting Association Rule of classification in building a URL classifier that analyzed extracted features of a URL and use it in predicting if it is malicious or not. 0.546 level of accuracy and an error rate of 0.484 was achieved as multiple URL features were employed in the classification process.en_US
dc.identifier.urihttps://ir.unilag.edu.ng/handle/123456789/5039
dc.language.isoenen_US
dc.publisherCovenant Journal of Informatics & Communication Technologyen_US
dc.subjectMalicious, Association rule, URLs, Cybercrime, Hackersen_US
dc.titleDetecting Malicious and Compromised URLs in E-Mails Using Association Ruleen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
685-1203-1-SM.pdf
Size:
481.23 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: