Department of Computer Science, Faculty of Communication and Information Sciences, University of Ilorin. PMB 1515 Ilorin, Kwara State, Nigeria
BibTex Citation Data :
@article{JTSISKOM13965, author = {Kayode Sakariyah Adewole and Muiz Olalekan Raheem and Muyideen Abdulraheem and Idowu Dauda Oladipo and Abdullateef Oluwagbemiga Balogun and Omotola Fatimah Baker}, title = {Malicious URLs detection using data streaming algorithms}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {9}, number = {4}, year = {2021}, keywords = {Data streaming; Phishing; Naïve Bayes; Machine learning; Hoeffding Tree.}, abstract = {As a result of advancements in technology and technological devices, data is now spawned at an infinite rate, emanating from a vast array of networks, devices, and daily operations like credit card transactions and mobile phones. Datastream entails sequential and real-time continuous data in the inform of evolving stream. However, the traditional machine learning approach is characterized by a batch learning model. Labeled training data are given apriori to train a model based on some machine learning algorithms. This technique necessitates the entire training sample to be readily accessible before the learning process. The training procedure is mainly done offline in this setting due to the high training cost. Consequently, the traditional batch learning technique suffers severe drawbacks, such as poor scalability for real-time phishing websites detection. The model mostly requires re-training from scratch using new training samples. This paper presents the application of streaming algorithms for detecting malicious URLs based on selected online learners: Hoeffding Tree (HT), Naïve Bayes (NB), and Ozabag. Ozabag produced promising results in terms of accuracy, Kappa and Kappa Temp on the dataset with large samples while HT and NB have the least prediction time with comparable accuracy and Kappa with Ozabag algorithm for the real-time detection of phishing websites.}, issn = {2338-0403}, pages = {224--229} doi = {10.14710/jtsiskom.2021.13965}, url = {https://jtsiskom.undip.ac.id/article/view/13965} }
Refworks Citation Data :
Article Metrics:
Last update:
Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection
Last update: 2024-11-05 05:31:28
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.