Klasifikasi Malicious URL Menggunakan Algoritma Improved Random Forest dan Random Forest Berbasis Web
URLs are very much on the network of computer systems. Moreover, nowadays all activities use an online system. Starting from social media, and marketplaces to group chat applications. An early prevention system from malicious URL attacks is needed to counteract the large number of URLs circulating in the online system. Previously detection of malicious URLs based on blacklisting and UURLs are very much on the network of computer systems. Moreover, nowadays all activities use an online system. Starting from social media, marketplaces to group chat applications. An early prevention system from malicious URL attacks is needed to counteract the large number of URLs circulating in the online system. Previously, malicious URL detection based on Blacklisting and Heuristic URLs could not recognize the new type of malicious URL without first being analyzed. For this reason, a technique is needed to detect malicious URLs using machine learning. The lack of machine learning in the detection of malicious URLs is that it is not 100% able to detect malicious URLs precisely. This study will use an improved random forest approach with a random forest as a classifier to detect malicious URLs. Improved Random Forest is a Random Forest that is used using evaluator features and filter instances to improve the accuracy of ordinary random forests. This study concluded that both methods of improved random forest and ordinary random forest have an accuracy value above 98%.
F. Alkhudair, M. Alassaf, R. Ullah Khan, and S. Alfarraj, “Detecting Malicious URL,” 2020 International Conference on Computing and Information Technology, ICCIT 2020, pp. 0–4, 2020, doi: 10.1109/ICCIT-144147971.2020.9213792.
D. Stevanovic, N. Vlajic, and A. An, “Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users,” Procedia Comput Sci, vol. 5, pp. 123–131, 2011, doi: 10.1016/j.procs.2011.07.018.
B. Stackpole, “Red Cross to World Governments: Do More to Stop attacks on Healthcare Orgs,” 2020.
A. Chaudhary, S. Kolhe, and R. Kamal, “An improved random forest classifier for multi-class classification,” Information Processing in Agriculture, vol. 3, no. 4, pp. 215–222, 2016, doi: 10.1016/j.inpa.2016.08.002.
T. Wang, S. Yu, and B. Xie, “A novel framework for learning to detect malicious web pages,” in Proceedings - 2010 International Forum on Information Technology and Applications, IFITA 2010, 2010, vol. 2, pp. 353–357. doi: 10.1109/IFITA.2010.173.
A. Sirageldin, B. B. Baharudin, and L. T. Jung, “Malicious web page detection: A machine learning approach,” in Lecture Notes in Electrical Engineering, 2014, vol. 279 LNEE, pp. 217–224. doi: 10.1007/978-3-642-41674-3_32.
A. Altaher, “Phishing Websites Classification using Hybrid SVM and KNN Approach,” 2017. [Online]. Available: www.ijacsa.thesai.org
B. Cui, S. He, X. Yao, and P. Shi, “Biographical notes: Baojiang Cui received his BS in the Hebei University of Technology, China, in 1994, MS in the Harbin Institute of Technology, China, in 1998 and PhD in Control Theory and,” 2018.
C. Liu, L. Wang, B. Lang, and Y. Zhou, “Finding effective classifier for malicious URL detection,” in ACM International Conference Proceeding Series, Jan. 2018, pp. 240–244. doi: 10.1145/3180374.3181352.
“Sistem Sistem Informasi Manajemen Surat Berbasis Website di STMIK Pringsewu,” Jurnal Sains
dan Informatika, vol. 7, no. 1, pp. 17–22, Mar. 2021, doi: 10.22216/jsi.v7i1.340.
S. M. Nair, “Detecting Malicious URL using Machine Learning: A Survey,” Int J Res Appl Sci Eng Technol, vol. 8, no. 5, pp. 2670–2677, May 2020, doi: 10.22214/ijraset.2020.5447.
V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, “Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset,” Expert Syst Appl, vol. 38, no. 5, pp. 5947–5957, May 2011, doi: 10.1016/j.eswa.2010.11.028.
D. Canali, M. Cova, G. Vigna, and C. Kruegel, “Prophiler,” in Proceedings of the 20th international conference on World wide web - WWW ’11, 2011, p. 197. doi: 10.1145/1963405.1963436.
B. Eshete, A. Villafiorita, and K. Weldemariam, “BINSPECT: Holistic Analysis and Detection of Malicious Web Pages,” 2013, pp. 149–166. doi: 10.1007/978-3-642-36883-7_10.
M. Denil, D. Matheson, and N. de Freitas, “Narrowing the Gap: Random Forests In Theory and In Practice,” Oct. 2013, [Online]. Available: http://arxiv.org/abs/1310.1415
UNB, “Canadian Institute for Cybersecurity,” 2016.
How to Cite
Copyright (c) 2023 SAINS DAN INFORMATIKA : RESEARCH OF SCIENCE AND INFORMATIC
This work is licensed under a Creative Commons Attribution 4.0 International License.