Detection of phishing portals through machine learning algorithms
Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. Method. Systematization of disparate information, analysis of the field, description of available developments are the main methods that were used in the study. The wor...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2024-10-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/1567 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. Method. Systematization of disparate information, analysis of the field, description of available developments are the main methods that were used in the study. The work is divided into three large sub-blocks. The first one analyzes the concept of machine learning, describes the main ways to correctly interpret the information entered, indicates the most popular techniques and databases. In the second part of the work, an analysis of artificial neural networks is carried out. In particular, their subspecies are shown with a description of the implementation features, and a comparison with living neurons is carried out. In the third part, the practical implementation of the two techniques and their comparison are carried out, recommendations are given regarding their use in detecting phishing portals. Result. The paper investigates the methods of analyzing phishing portals. The analysis showed that it is most rational to use a random forest, because it provides quality according to the precession, recall, F1-score, 98% metrics with a significant number of parametric values entered. Conclusions. When implementing various search methodologies for phishing portals, it is necessary to take into account their decrease in efficiency from the entered parameters. To do this, it is important to conduct preliminary tests. However, the test result can be interpreted in different ways. In particular, the effectiveness of the methods can be improved if you limit the number of input parameters, but at the same time rigidly structured according to one search criterion. |
|---|---|
| ISSN: | 2073-6185 2542-095X |