scholarly journals Identifying malicious web domains using machine learning techniques with online credibility and performance data

Author(s):  
Zhongyi Hu ◽  
Raymond Chiong ◽  
Ilung Pranata ◽  
Willy Susilo ◽  
Yukun Bao
2019 ◽  
Vol 119 (3) ◽  
pp. 676-696 ◽  
Author(s):  
Zhongyi Hu ◽  
Raymond Chiong ◽  
Ilung Pranata ◽  
Yukun Bao ◽  
Yuqing Lin

Purpose Malicious web domain identification is of significant importance to the security protection of internet users. With online credibility and performance data, the purpose of this paper to investigate the use of machine learning techniques for malicious web domain identification by considering the class imbalance issue (i.e. there are more benign web domains than malicious ones). Design/methodology/approach The authors propose an integrated resampling approach to handle class imbalance by combining the synthetic minority oversampling technique (SMOTE) and particle swarm optimisation (PSO), a population-based meta-heuristic algorithm. The authors use the SMOTE for oversampling and PSO for undersampling. Findings By applying eight well-known machine learning classifiers, the proposed integrated resampling approach is comprehensively examined using several imbalanced web domain data sets with different imbalance ratios. Compared to five other well-known resampling approaches, experimental results confirm that the proposed approach is highly effective. Practical implications This study not only inspires the practical use of online credibility and performance data for identifying malicious web domains but also provides an effective resampling approach for handling the class imbalance issue in the area of malicious web domain identification. Originality/value Online credibility and performance data are applied to build malicious web domain identification models using machine learning techniques. An integrated resampling approach is proposed to address the class imbalance issue. The performance of the proposed approach is confirmed based on real-world data sets with different imbalance ratios.


Author(s):  
G. Maria Jones ◽  
S. Godfrey Winster

The ever-rapid development of technology in today's world tends to provide us with a dramatic explosion of data, leading to its accumulation and thus data computation has amplified in comparison to the recent past. To manage such complex data, emerging new technologies are enabled specially to identify crime patterns, as crime-related data is escalating. These digital technologies have the potential to manipulate and also alter the pattern. To combat this, machine learning techniques are introduced which have the ability to analyse such voluminous data. In this work, the authors intend to understand and implement machine learning techniques in real time data analysis by means of Python. The detailed explanation in preparing the dataset, understanding, visualizing the data using pandas, and performance measure of algorithm is evaluated.


2017 ◽  
Vol 48 (5) ◽  
pp. 78-94 ◽  
Author(s):  
Giorgio Locatelli ◽  
Miljan Mikic ◽  
Milos Kovacevic ◽  
Naomi Brookes ◽  
Nenad Ivanisevic

Megaprojects are often associated with poor delivery performance and poor benefits realization. This article provides a method of identifying, in a quantitative and rigorous manner, the characteristics related to project management success in megaprojects. It provides an investigation of how stakeholders can use this knowledge to ensure more effective design and delivery for megaprojects. The research is grounded in 44 mega-projects and a systematic, empirically based methodology that employs the Fisher's exact test and machine learning techniques to identify the correlation between megaprojects’ characteristics and performance, paving the way to an understanding of their causation.


Change detection is used to find whether the changes happened or not between two different time periods using remote sensing images. We can use various machine learning techniques and deep learning techniques for the change detection analysis using remote sensing images. This paper mainly focused on computational and performance analysis of both techniques in the application of change detection .For each approach, we considered ten different kinds of algorithms and evaluated the performance. Moreover, in this research work, we have analyzed merits and demerits of each method which have used to change detection.


Author(s):  
Jai Narayan Tripathi ◽  
Heman Maheshbhai Vaghasiya ◽  
Dinesh Junjariya ◽  
Aksh Chordia

Author(s):  
José María Jorquera Valero ◽  
Pedro Miguel Sánchez Sánchez ◽  
Alberto Huertas Celdran ◽  
Gregorio Martínez Pérez

Continuous authentication systems allow users not to possess or remember something to authenticate themselves. These systems perform a permanent authentication that improves the security level of traditional mechanisms, which just authenticate from time to time. Despite the benefits of continuous authentication, the selection of dimensions and characteristics modelling of user's behaviour, and the creation and management of precise models based on Machine learning, are two important open challenges. This chapter proposes a continuous and adaptive authentication system that uses Machine Learning techniques based on the detection of anomalies. Applications usage and the location of the mobile device are considered to detect abnormal behaviours of users when interacting with the device. The proposed system provides adaptability to behavioural changes through the insertion and elimination of patterns. Finally, a proof of concept and several experiments justify the decisions made during the design and implementation of this work, as well as demonstrates its suitability and performance.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1678 ◽  
Author(s):  
Ahmed H. Salamah ◽  
Mohamed Tamazin ◽  
Maha A. Sharkas ◽  
Mohamed Khedr ◽  
Mohamed Mahmoud

The smartphone market is rapidly spreading, coupled with several services and applications. Some of these services require the knowledge of the exact location of their handsets. The Global Positioning System (GPS) suffers from accuracy deterioration and outages in indoor environments. The Wi-Fi Fingerprinting approach has been widely used in indoor positioning systems. In this paper, Principal Component Analysis (PCA) is utilized to improve the performance and to reduce the computation complexity of the Wi-Fi indoor localization systems based on a machine learning approach. The experimental setup and performance of the proposed method were tested in real indoor environments at a large-scale environment of 960 m2 to analyze the performance of different machine learning approaches. The results show that the performance of the proposed method outperforms conventional indoor localization techniques based on machine learning techniques.


Sign in / Sign up

Export Citation Format

Share Document