UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 9
September-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1809556


Registration ID:
188623

Page Number

339-345

Share This Article


Jetir RMS

Title

Applying C4.5 Decision Tree to Classify Phishing URL

Abstract

Data mining is one of the most essential techniques for analyzing large amount of data. The analysis of data leads to provide the data patterns by which experts can predict, make decisions and understand the associations among different attributes. Therefore, in large number of applications, the data mining techniques are frequently used. In this presented work, the data mining is demonstrated for performing the classification task of web based URLs. The main aim behind this classification is to analyze the pattern of unsolicited URLs. In this context, an accurate data mining technique namely C4.5 decision tree algorithm is used. The C4.5 decision tree algorithm is a supervised learning algorithm which performs the entire data and their attributes into a kind of tree structure and using this structure can be used for predicting the data patterns. In this decision tree, the tree nodes are providing the relationship among the data attributes and the edges of this tree provides the values of the attributes to form the relationships. Finally, the leaf node of this tree demonstrates the decision of the classification. In order to provide the decision of phishing URLs, the PhishTank data set is used. This data set contains a significant amount of phishing URLs which is further evaluated on the basis of feature extraction technique. Using these feature study and obtained patterns in data, the decision tree algorithm is prepared and prediction is made. In order to justify the performance of the proposed URL classification technique. A traditional technique is also implemented which is based on Apriori algorithm. The comparative performance study demonstrates the proposed technique is efficient and accurate as compared to the Apriori based phishing URL classification technique.

Key Words

Data Mining, Phishing, URL Detection, Decision Tree, Apriori, PhishTank, Phishing Website.

Cite This Article

"Applying C4.5 Decision Tree to Classify Phishing URL", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 9, page no.339-345, September-2018, Available :http://www.jetir.org/papers/JETIR1809556.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Applying C4.5 Decision Tree to Classify Phishing URL", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 9, page no. pp339-345, September-2018, Available at : http://www.jetir.org/papers/JETIR1809556.pdf

Publication Details

Published Paper ID: JETIR1809556
Registration ID: 188623
Published In: Volume 5 | Issue 9 | Year September-2018
DOI (Digital Object Identifier): http://doi.one/10.1729/Journal.18639
Page No: 339-345
Country: Indore, Madhya Pradesh, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002852

Print This Page

Current Call For Paper

Jetir RMS