期刊文献+

基于SVM主动学习算法的网络钓鱼检测系统 被引量:10

Phishing Detection System Based on SVM Active Learning Algorithm
下载PDF
导出
摘要 针对钓鱼式网络攻击,从URL入手,对网址URL和Web页面内容综合特征进行识别、分类,实现网络钓鱼检测并保证检测的效率和精度。用支持向量机主动学习算法和适合小样本集的分类模型提高分类性能。实验结果证明,网络钓鱼检测系统能达到较高的检测精度。 To detect and prevent various kinds of phishing attacks,there are many different preventive strategies and detective ideas.This paper takes the research of URL as the point of departure,describes how to detect phishing through the identification classification of the integrated features of URL and Web page content so as to ensure the efficiency and accuracy of detection.In the decision of the classification algorithm,it chooses Support Vector Machine(SVM) active learning algorithm which adapts to the small sample set of the classification model and achieves the ideal performance of the classification.Experimental results show that the system can achieve higher detection accuracy and performance with a small sample of the classification model training set.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第19期126-128,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61071081) 上海市自然科学基金资助项目(09ZR1414900)
关键词 网络钓鱼 支持向量机 主动学习算法 分类器 敏感特征 phishing Support Vector Machine(SVM) active learning algorithm classifier sensitive characteristic
  • 相关文献

参考文献7

  • 1Justin M K. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs[C]//Proc. of ACM SIGKDD’09. Paris, France: ACM Press, 2009: 1245-1253.
  • 2Basnet S M. Detection of Phishing Attacks: A Machine Learning Approach[M]//Prasad B. Soft Computing Applications in Industry. Berlin, Germany: Springer, 2008.
  • 3郭敏哲,袁津生,王雅超.网络钓鱼Web页面检测算法[J].计算机工程,2008,34(20):161-163. 被引量:8
  • 4Pan Ying. Anomaly Based Web Phishing Page Detection[C]//Proc. of Computer Security Applications Conference. Miami Beach, Florida, USA: [s. n.], 2006: 381-392.
  • 5曹玖新,毛波,罗军舟,刘波.基于嵌套EMD的钓鱼网页检测算法[J].计算机学报,2009,32(5):922-929. 被引量:13
  • 6张健沛,徐华.支持向量机(SVM)主动学习方法研究与应用[J].计算机应用,2004,24(1):1-3. 被引量:51
  • 7Wilson T M. Improved Heterogeneous Distance Functions[J]. Journal of Artificial Intelligence Research, 1997, 6(1): 1-34.

二级参考文献16

  • 1张恒博,欧宗瑛.一种基于色彩和灰度直方图的图像检索方法[J].计算机工程,2004,30(10):20-22. 被引量:40
  • 2Pan Ying, Ding Xuhua. Anomaly based Web phishing page detection//Proceedings of the 22nd Annual Computer Securi- ty Applications Conference. Washington, DC, USA, 2006: 381-393
  • 3Fu Anthony Y, L W, Deng Xiaotie. Detecting phishing Web pages with visual similarity assessment based on earth mov- er's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 301-311
  • 4Liu W, G H, Liu X, Zhang M, Deng X. Phishing Webpage deteetion//Proeeedings of the 8th International Conference on Documents Analysis and Recognition. Seoul, Korea, 2005:560-564
  • 5Nesbitt K V, Friedrich C. Applying gestalt principles to animated visualizations of network data//Proceedings of the 6th International Conference on Information Visualisation. Boston, USA, 2002:737-743
  • 6Kim Duck Hoon, Yun Il Dong, Lee Sang Uk. A new attributed relational graph matching algorithm using the nested structure of earth mover's distance//Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004). Cambridge, UK, 2004, 1:48-51
  • 7Dhamija Rachna, Tygar J D. The battle against phishing: Dynamic security skins//Proeeedings of the 2005 Symposium on Usable Privacy and Security Table of Contents. Pittsburgh, Pennsylvania, 2005:77-88
  • 8Inomata A, Rahman M, Okamoto T, Okamoto E. A novel mail filtering method against phishing//Proceedings of the Conference on Communications, Computers and signal Processing (PACRIM 2005), 2005:221-224
  • 9Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu Upadhyaya. PHONEY: Mimicking user response to detect phishing attacks//Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks Table of Contents. Washington, DC, USA: IEEE Computer Society, 2006:668-672
  • 10Choi Daeseon, Jin Seunghun, Yoon Hyunsoo. A method for preventing the leakage of the personal information on the Internet//Proeeedings of the 8th International Conference, Advanced Communication Technology. Korea, 2006, 2:20-22

共引文献66

同被引文献54

引证文献10

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部