期刊文献+

基于改进随机森林算法的钓鱼网站检测方法研究 被引量:5

Research on Detection Methods of Phishing Websites Based on Improved Random Forest Algorithm
下载PDF
导出
摘要 为了更准确快捷的对钓鱼网站进行识别,提出了一种基于改进随机森林算法的钓鱼网站检测方法.该方法挖掘钓鱼网页特征之间潜在的关联规则,并对数据集进行分区,以此区分特征数据的重要程度并计算权重以及数据选取的比例,选取数据后对数据空间进行相应的集合化与剪辑以此优化森林的建立,并根据建立的森林达到对钓鱼网站检测识别的目的.最终实验说明,该方法对钓鱼网站的检测识别具有很好的效果和效率. In order to improve the efficiency of phishing detection,a new algorithm was proposed to improve the traditional random forest algorithm. Potential association rules between web features are mined and used to partition the data set,in order to distinguish the features of different structures and calculate the weight of different data space to determine the scale of the selection. After selection of data, training data sets need to be aggregated and clipped to optimize the establishment of forests. Websites are trained and predicted using voting in decision forest. Experiments result shows that the new algorithm has obvious advantages in efficiency and effectiveness compared with the other two algorithm.
作者 朱琪 林果园 ZHU Qi;LIN Guo-yuanh(School of computer science and technology, China University of Mining and Technology, XuZhou 221116, China;Mine Digitization Engineering Research Center of the Ministry of Education, XuZhou 221116, China;State Key laboratory for Novel Software Technology. Nanjing University, NanJing 210023 , China)
出处 《微电子学与计算机》 北大核心 2019年第4期43-46,51,共5页 Microelectronics & Computer
基金 江苏省产学研前瞻性联合研究项目(BY2016026-04) 软件新技术国家重点实验室开放基金项目(KFKT2018B27)
关键词 钓鱼检测 关联规则 特征分区 数据空间 fishing detection association rules feature partition data space
  • 相关文献

参考文献4

二级参考文献68

  • 1徐凤亚,罗振声.文本自动分类中特征权重算法的改进研究[J].计算机工程与应用,2005,41(1):181-184. 被引量:56
  • 2金山网络.2012年度计算机病毒及钓鱼网站统计报告[EB/OL].[2014-04-15].http://www.ijinshan.com/news/safety-data-2.shtml.
  • 3Google. Google safe browsing API[EB/OL].[2014-04-15].http://code.google.com/apis/safebrowsing/.
  • 4PRAKASH P, KUMAR M, KOMPELLA R R, et al. PhishNet: predictive blacklisting to detect phishing attacks[C]//Proceedings of the IEEE INFOCOM. New York: IEEE, 2010:1-5.
  • 5SHENG S, WARDMAN B, WARNER G, et al. An empirical analysis of phishing blacklists[C]//Proceedings of the 6th Conference on Email and Anti-Spam. CA, USA: CEAS, 2009.
  • 6GARERA S, PROVOS N, CHEW M, et al. A framework for detection and measurement of phishing attacks[C]//Proceedings of the 2007 ACM Workshop on Recurring Malcode(WORM'07).New York: ACM Press, 2007: 1-8.
  • 7BASNET R B, SUNG A H. Mining web to detect phishing URLs[C]//Proceedings of the 11th International Conference on Machine Learning and Applications (ICMLA 2012).Los Alamitos: IEEE Computer Society, 2012: 568-573.
  • 8ZHANG Jianyi, WANG Yonghao. A real-time automatic detection of phishing URLs[C]//Proceedings of the 2nd International Conference on Computer Science and Network Technology (ICCSNT2012). Piscatawaty: IEEE, 2012: 1212-1216.
  • 9CHEN Kuanta, JAU-YUAN C, HUANG Chunrong, et al. Fighting phishing with discriminative keypoint features[J]. Proceedings of IEEE Internet Computing, 2009, 13(3): 56-63.
  • 10HARA M, YAMADA A, MIYAKE Y. Visual similarity-based phishing detection without victim site information[C]//IEEE Symposium on Computational Intelligence in Cyber Security (CICS'09). Piscataway: IEEE, 2009: 30-36.

共引文献44

同被引文献37

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部