Phishing URLs in the context of artificial intelligence

Authors

  • A. SAILAJA Author
  • K. NAVEEN Author
  • VM. ROHITH KUMAR Author
  • V. PAVAN KUMAR Author
  • V. BASHA Author

Keywords:

G Boost , Decision tree.

Abstract

Most of the time, bad places make it easier for online groups to grow and help spread cybercrimes.
Thusly, there has solid districts for been to enable focal responses for getting the client a long way
from visiting such Regions. Using a learning-based approach, we propose characterizing
referencing regions into three social events: Innocuous, Spam and Noxious. Our instrument
basically destroys the Uniform Resource Locater (URL) itself without getting to the substance of
Areas. In this way, it avoids run-time dormancy and the bet of familiarizing clients with program-
based surrenders. Our layout outwits the boycotting relationship to the degree that strategy and
thought thinking about the utilization of learning examinations.
URLs of the battles are secluded into 3 classes:
●Innocuous: Safe districts with typical affiliations
●Spam: Played out the verification that the website is trying to overwhelm the client with
information or focuses like web dating and fake audits.
●Malware: Site made by aggressors to disturb PC improvement, all out fragile information, or get
satisfactorily near private PC structures.

Downloads

Download data is not yet available.

Downloads

Published

30-04-2024

How to Cite

Phishing URLs in the context of artificial intelligence. (2024). International Journal of Information Technology and Computer Engineering, 12(2), 690-698. https://ijitce.org/index.php/ijitce/article/view/587

Similar Articles

1-10 of 235

You may also start an advanced similarity search for this article.