Identifying Malicious Web Links and Their Attack Types in Social Networks

Authors(3) :-R. Hamsa Veni, A.Hariprasad Reddy, C.Kesavulu

Malicious URLs are wide wont to mount numerous cyber attacks together with spamming, phishing and malware. Detection of malicious URLs and identification of threat varieties area unit important to thwart these attacks. Knowing the type of a threat permits estimation of severity of the attack and helps adopt a good step. Existing strategies usually notice malicious URLs of one attack kind. During this paper, we have a tendency to propose methodology using machine learning to notice malicious URLs of all the popular attack varieties and establish the character of attack a malicious address tries to launch. Our method uses a range of discriminative options together with matter properties, link structures, webpage contents, DNS information, and network traffic. Several of those options are novel and extremely effective.

Authors and Affiliations

R. Hamsa Veni
Assistant Professor, Department of MCA, Sri Venkateswara College of Engineering and Technology, Chittoor, AP, India,
A.Hariprasad Reddy
PG Scholar, Department of MCA, Sri Venkateswara College of Engineering and Technology, Chittoor, AP, India
PG Scholar, Department of MCA, Sri Venkateswara College of Engineering and Technology, Chittoor, AP, India

Cyber Attacks, DNS Information, URL, Malicious Address.

  1. Xiangnan Kong, Michael K. Ng, and Zhi-Hua Zhou, “Transductive Multi-label Learning via Label Set Propagation” IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 3, March 2013.
  2. GrigoriosTsoumakas, IoannisKatakis,“Multi-Label Classification: An Overview” International Journal Data Warehousing and Mining , 2007.
  3. Lei Wu, Min-Ling Zhang “Multi-Label Classification with Unlabeled Data: An Inductive Approach” JMLR: Workshop and Conference proceedings 29:197-212, 2013
  4. Charles X. Ling, Victor S. Sheng “Cost-Sensitive Learning and the Class Imbalance Problem” Encyclopedia of Machine Learning. C. Sammut (Ed.). Springer.
  5. Hung-Yi Lo, Shou-De Lin, and Hsin-Min Wang, “Generalized k-Label sets Ensemble for Multi-Label and Cost-Sensitive Classification” IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 7, July 2014 1679 Chun-Liang Li, Hsuan-Tien Lin “Condensed Filter for Cost-sensitive Multi-label Classification” International conference on machine learning , China JMLR :W/P volume 32.
  6. M.-L. Zhang and Z.-H. Zhou, “ML-kNN: A Lazy Learning Approach to Multi-Label Learning,” Pattern Recognition, vol. 40,no. 7, pp. 2038-2048, 2007. Pranali Dhongade et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014, pg. 189-196 © 2014, IJCSMC All Rights Reserved 195
  7. R.E. Schapire and Y. Singer, “BoostTexter: A Boosting-Based System for Text Categorization,” Machine Learning, vol. 39, nos. 2/3, pp. 135-168, 2000
  8. Y. Freund and R.E. Schapire, “A Decision-Theoretic Generalization of On- Line Learning and an Application to Boosting,” J. Computer and System Sciences, vol. 55, no.1, pp. 119-139, 1997.
  9. N. Ghamrawiand A. McCallum, “Collective Multi-Label, Classification”Proc. 14th Int’l Conf. Information and Knowledge Management, pp. 195-200, 2005
  10. Elisseeff and J. Weston, “A Kernel Method for Multi-Labelled Classification,” Advances in Neural Information Processing Systems 14, T.G. Dietterich, S. Becker and Z. Ghahramani, eds., pp. 681-687, MIT Press, 2002.
  11. V.N. Vapnik, Statistical Learning Theory. Wiley, 1998.
  12. T. Joachims, “Transductive Inference for Text Classification Using Support Vector Machines,” Proc. 16th International Conf. Machine Learning, pp. 200-209, 1999.
  13. Krzysztof Dembczy´, Weiwei Cheng ,Eyke H¨ullermeier1 “ Bayes Optimal Multi-labelClassification via Probabilistic Classifier Chains “International Conference on Machine Learning, Haifa, Israel, 2010.
  14. HiteshriModi Mahesh Panchal, “Experimental Comparison of Different Problem Transformation Methods for Multi-Label Classification using MEKA” International Journal of Computer Applications Volume 59No.15, December 2012
  15. Oscar Luaces, Jorge Díez, José Barranquero· Juan José del Coz · Antonio Baham “Binary relevance efficacy for multilabel classification” © Springer-Verlag Berlin Heidelberg 2012
  16. Erica Akemi Tanaka1 and Jos´e Augusto Baranauskas “An Adaptation of Binary Relevance for Multi-Label Classification applied to Functional Genomics” ISSN -2012.
  17. Cherman, E. A., J. Metz and M. C. Monard, “Incorporating label dependency into the binary relevanceframework for multi-label classification, Expert Systems with Applications” 39(2012), pp. 1647–1655.
  18. Newton Spolaor,EvertonAlvaresCherman, Maria Carolina Monard&Huei Diana Lee, “A Comparison of Multilabel Feature Selection Methods using the Problem Transformation Approach” ELSEVIER-Electronic Notes in Theoretical Computer Science 292 (2013) 135–151
  19. GrigoriosTsoumakas, IoannisKatakis, and IoannisVlahavas, “Mining Multi-label Data” Data Mining and Knowledge Discovery Handbook 2010, pp 667-685
  20. D. W. Aha, Lazy learning: Special issue editorial, Artificial Intelligence Review 11 (1-5) (1997) 7-10.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1060-1066
Manuscript Number : CSEIT1833525
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

R. Hamsa Veni, A.Hariprasad Reddy, C.Kesavulu, "Identifying Malicious Web Links and Their Attack Types in Social Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1060-1066, March-April-2018.
Journal URL :

Article Preview