1,544
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Machine learning approach for identifying suspicious uniform resource locators (URLs) on Reddit social network

, , ORCID Icon &

References

  • Abdelhamid, N., F. Thabtah, and H. Abdel-jaber. 2017. “Phishing Detection: A Recent Intelligent Machine Learning Comparison Based on Models Content and Features.” 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), 2017: 72–77. doi:10.1109/ISI.2017.8004877
  • Ali, W. 2017. “Phishing Website Detection Based on Supervised Machine Learning with Wrapper Features Selection.” (IJACSA) International Journal of Advanced Computer Science and Applications 8 (9): 72–78.
  • Al-Janabi, M. F. 2018. Detection of Suspicious URLs in Online Social Networks Using Supervised Machine Learning Algorithms. Sydney: Keele University.
  • Arielle, P. 2018. “The Inside Story of Reddit’s Redesign.” Wired, February 4. https://www.wired.com/story/reddit-redesign/.
  • Azeez, N. A., T. J. Ayemobola, S. Misra, R. Maskeliūnas, and R. Damaševičius. 2019a. “Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce.” Computers 8 (4): 86.
  • Azeez, N. A., O. E. Odufuwa, S. Misra, J. Oluranti, and R. Damaševičius. 2021. “Windows PE Malware Detection Using Ensemble Learning.” Informatics 2021 (8): 10. doi:10.3390/informatics8010010.
  • Azeez, N. A., B. B. Salaudeen, S. Misra, R. Damasevicius, and R. Maskeliunas. 2019b. “Identifying Phishing Attacks in Communication Networks using URL Consistency Features.” International Journal of Electronic Security and Digital Forensics (InderScience). https://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijesdf.
  • Azeez, N. A., and C. V. Vyver. 2019. “Verifying Literal and Conceptual Consistency for Anti-Phishing.” IST-Africa 2019 In Proceedings of Conference Nairobi, Kenya, 08-10 May 2019, edited by Paul Cunningham and Miriam Cunningham. IIMC International Information Management Corporation.
  • Babagoli, M., M. P. Aghababa, and V. Solouk. 2018. “Heuristic Nonlinear Regression Strategy for Detecting Phishing Websites.” Soft Computing 3: 1–13.
  • Basnet, R., and A. Sung. 2011. “Learning to Detect Phishing Webpages.” Journal of Internet Services and Information Security 4 (3): 21–39.
  • Buber, E., B. Diri, and O. K. Sahingoz. 2017. “NLP Based Phishing Attack Detection from URLs.” In Intelligent Systems Design and Applications, edited by A. Abraham, P. K. Muhuri, A. K. Muda, and N. Gandhi, 608–618. Cham: Springer International PUBLISHING.
  • Chiew, K. L., C. L. Tan, K. Wong, K. S. C. Yong, and W. K. Tiong. 2020. “A new Hybrid Ensemble Feature Selection Framework for Machine Learning-Based Phishing Detection System.” Information Sciences 484 (2019): 153–166.
  • Clement, J. 2019a. “Online Industries Most Targeted by Phishing Attacks as of 4th Quarter 2018.” Accessed from Statista https://www.statista.com/statistics/266161/websites-most-affected-by-phishing/.
  • Clement, J. 2019b. “Percentage of U.S. Adults Who Use Reddit as of February 2019, by Age Group.” Accessed from Statista https://www.statista.com/statistics/261766/share-of-us-internet-users-who-use-reddit-by-age-group/.
  • Feng, F., Q. Zhou, Z. Shen, X. Yang, L. Han, and J. Wang. 2018. “The Application of a Novel Neural Network in the Detection of Phishing Websites.” Journal of Ambient Intelligence and Humanized Computing 9: 2009–2010.
  • Islam, M., and N. K. Chowdhury. 2016. “Phishing Websites Detection Using Machine Learning Based Classification Techniques.” International Conference on Advances in Informatics and Communication Technologies (63).
  • Jain, A. K., and B. B. Gupta. 2018a. “A Machine Learning Based Approach for Phishing Detection Using Hyperlinks Information.” Journal of Ambient Intelligence and Humanized Computing 10: 2015–2028.
  • Jain, A. K., and B. B. Gupta. 2018b. “Towards Detection of Phishing Websites on Client–Side Using Machine Learning Based Approach.” Telecommunication Systems 68 (4): 687–700.
  • Jeeva, S. C., and E. B. Rajsingh. 2016. “Intelligent Phishing URL Detection Using Association Rule Mining.” Human-Centric Computing and Information Sciences 6 (10). doi:10.1186/s13673-016-0064-3.
  • Kamal, G., and M. Manna. 2018. “Detection of Phishing Websites Using Naïve Bayes Algorithms.” International Journal of Recent Research and Review XI (4): 34–38.
  • Katuri, R., and S. Gorantla. 2021. “Math Function-Based Controller Combined with PI and PID Applied to Ultracapacitor Based Solar-Powered Electric Vehicle.” African Journal of Science, Technology, Innovation and Development 13 (4): 509–526. doi:10.1080/20421338.2020.1857542.
  • Mediakix. 2017. “The Top 8 Reddit Statistics on Users, Demographics & More.” Mediakix. https://mediakix.com/blog/reddit-statistics-users-demographics/.
  • Misra, S. 2020. “A Step-by-Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related Disciplines.” In International Conference on Information and Communication Technology and Applications, edited by S. Misra, and B. Muhammad-Bello, 727–744. Cham: Springer.
  • Mohammad, R.M., F. Thabtah, and L. McCluskey. 2012. “An Assessment of Features Related to Phishing Websites Using an Automated Technique.” Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions, 492–497. London, UK, 10–12 December 2012.
  • Muppavarapu, V., A. Rajendran, and S. Vasudevan. 2018. “Phishing Detection Using RDF and Random Forests.” The International Arab Journal of Information Technology 15 (55): 817–824.
  • Niakanlahiji, A., B.-T. Chu, and E. Al-Shaer. 2018. PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. 978-1-5386-7848-0/18, 6.
  • Peng, T., I. Harris, and Y. Sawa. 2018. “Detecting Phishing Attacks Using Natural Language Processing and Machine Learning.” In IEEE 12th International Conference on Semantic Computing (ICSC), edited by D. Bulterman, A. Kitazawa, D. Ostrowski, and P. Sheu, 300–301. Laguna Hills, CA: IEEE Computer Society.
  • Preethi, V., and G. Velmayil. 2016. “Automated Phishing Website Detection Using URL Features and Machine Learning Technique.” International Journal of Engineering and Techniques 2 (5): 107–115.
  • Ramzan, Z. 2010. “Phishing Attacks and Countermeasures (Vols. ISBN 978-3-642-04117-4).” In Handbook of Notes Information and Communication Security, edited by Mark Stamp, and Peter Stavroulakis, 433–448. Berlin, Heidelberg: Springer.
  • Rao, R. S., and A. R. Pais. 2018. “Detection of Phishing Websites Using an Efficient Feature-Based Machine Learning Framework.” Neural Computing and Applications 31: 3851–3873.
  • Sahingoz, K., E. Buber, O. Demir, and B. Diri. 2019. “Machine Learning Based Phishing Detection from URLs.” Expert Systems with Applications 117: 345–357.
  • Sananse, B. E., and T. K. Sarode. 2015. “Phishing URL Detection: A Machine Learning and Web Mining-Based Approach.” International Journal of Computer Applications 123 (13): 46–50.
  • Sheng, S., M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs. 2010. “Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions.” In CHI ‘10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, edited by E. Mynatt, G. Fitzpatrick, S. Hudson, K. Edwards, and T. Rodden, 373–382. Atlanta Georgia: Association for Computing Machinery.
  • Silaa, J., H. Jazri, and H. Muyingi. 2021. “A Study on the use of Mobile Computing Technologies for Improving the Mobility of Windhoek Residents.” African Journal of Science, Technology, Innovation and Development 13 (4): 479–493. doi:10.1080/20421338.2020.1838083.
  • Smadi, S., N. Aslam, and L. Zhang. 2018. “Detection of Online Phishing Email Using Dynamic Evolving Neural Network Based on Reinforcement Learning.” Decision Support Systems 107: 88–102.
  • Vanhoenshoven, F., G. Nápoles, R. Falcon, K. Vanhoof, and M. Köppen. 2016. “Detecting Malicious URLs Using Machine Learning Techniques.” In 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 8. Athens, Greece: IEEE. doi:10.1109/SSCI.2016.7850079.
  • Zhao, Z., R. Ye, C. Zhou, D. Wang, and T. Shi. 2021. “Control-theory Based Security Control of Cyber-physical Power System Under Multiple Cyber-attacks Within Unified Model Framework.” Cognitive Robotics 1: 41–57. doi:10.1016/j.cogr.2021.05.001.