Skip to main content
Top

2019 | OriginalPaper | Chapter

An Empirical Study on Performance Server Analysis and URL Phishing Prevention to Improve System Management Through Machine Learning

Authors : Antonio J. Tallón-Ballesteros, Simon James Fong, Raymond Kwok-Kay Wong

Published in: Economics of Grids, Clouds, Systems, and Services

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper tackles some important matters such as the server performance and the URL phishing. Nowadays the system management is a crucial issue and any potential failure needs to be detected quickly and, at the same time, to avoid URL phishing via defining rules in the firewall setting. An empirical study through data mining is conducted covering different prediction techniques. Lastly, some guidelines are provided to emit a critical view about what may happen and how to act immediately.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: DeepPhish: simulating malicious AI Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: DeepPhish: simulating malicious AI
2.
go back to reference Bzdok, D., Krzywinski, M., Altman, N.: Machine learning: supervised methods, SVM and kNN. Nature Methods (2018) Bzdok, D., Krzywinski, M., Altman, N.: Machine learning: supervised methods, SVM and kNN. Nature Methods (2018)
4.
go back to reference Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress), pp. 635–638. IEEE (2015) Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress), pp. 635–638. IEEE (2015)
5.
go back to reference Fung, G., Mangasarian, O.L.: Data selection for support vector machine classifiers. In: Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 64–70. ACM (2000) Fung, G., Mangasarian, O.L.: Data selection for support vector machine classifiers. In: Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 64–70. ACM (2000)
6.
go back to reference Giudici, P.: Applied Data Mining: Statistical Methods for Business and Industry. Wiley, Hoboken (2005)MATH Giudici, P.: Applied Data Mining: Statistical Methods for Business and Industry. Wiley, Hoboken (2005)MATH
7.
go back to reference Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning (2000) Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning (2000)
8.
go back to reference Heien, E., Kondo, D., Gainaru, A., LaPine, D., Kramer, B., Cappello, F.: Modeling and tolerating heterogeneous failures in large parallel systems. In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, p. 45. ACM (2011) Heien, E., Kondo, D., Gainaru, A., LaPine, D., Kramer, B., Cappello, F.: Modeling and tolerating heterogeneous failures in large parallel systems. In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, p. 45. ACM (2011)
9.
go back to reference Homenda, W., Pedrycz, W.: Pattern Recognition: A Quality of Data Perspective. Wiley, Hoboken (2018)CrossRef Homenda, W., Pedrycz, W.: Pattern Recognition: A Quality of Data Perspective. Wiley, Hoboken (2018)CrossRef
10.
go back to reference Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091–2121 (2013)CrossRef Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091–2121 (2013)CrossRef
11.
go back to reference Knobbe, A., Van der Wallen, D., Lewis, L.: Experiments with data mining in enterprise management. In: Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management, 1999. Distributed Management for the Networked Millennium, pp. 353–366. IEEE (1999) Knobbe, A., Van der Wallen, D., Lewis, L.: Experiments with data mining in enterprise management. In: Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management, 1999. Distributed Management for the Networked Millennium, pp. 353–366. IEEE (1999)
12.
go back to reference Lastdrager, E.E.H.: Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Sci. 3(1), 9 (2014)CrossRef Lastdrager, E.E.H.: Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Sci. 3(1), 9 (2014)CrossRef
13.
go back to reference Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014)CrossRef Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443–458 (2014)CrossRef
14.
go back to reference Nguyen, L.A.T., To, B.L., Nguyen, H.K., Nguyen, M.H.: A novel approach for phishing detection using URL-based heuristic. In: 2014 International Conference on Computing, Management and Telecommunications (ComManTel), pp. 298–303. IEEE (2014) Nguyen, L.A.T., To, B.L., Nguyen, H.K., Nguyen, M.H.: A novel approach for phishing detection using URL-based heuristic. In: 2014 International Conference on Computing, Management and Telecommunications (ComManTel), pp. 298–303. IEEE (2014)
16.
go back to reference Ramanathan, V., Wechsler, H.: phishGILLNET-phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training. EURASIP J. Inf. Secur. 2012(1), 1 (2012)CrossRef Ramanathan, V., Wechsler, H.: phishGILLNET-phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training. EURASIP J. Inf. Secur. 2012(1), 1 (2012)CrossRef
18.
go back to reference Schroeder, B., Gibson, G.: A large-scale study of failures in high-performance computing systems. IEEE Trans. Dependable Secur. Comput. 7(4), 337–350 (2010)CrossRef Schroeder, B., Gibson, G.: A large-scale study of failures in high-performance computing systems. IEEE Trans. Dependable Secur. Comput. 7(4), 337–350 (2010)CrossRef
19.
go back to reference Shi, H.: Best-first decision tree learning. Ph.D. thesis, The University of Waikato (2007) Shi, H.: Best-first decision tree learning. Ph.D. thesis, The University of Waikato (2007)
20.
go back to reference Tallón-Ballesteros, A.J., Correia, L.: Medium and high-dimensionality attribute selection in Bayes-type classifiers. In: 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI), pp. 121–126. IEEE (2017) Tallón-Ballesteros, A.J., Correia, L.: Medium and high-dimensionality attribute selection in Bayes-type classifiers. In: 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI), pp. 121–126. IEEE (2017)
22.
go back to reference Tallón-Ballesteros, A.J., Ibiza-Granados, A.: Simplifying pattern recognition problems via a scatter search algorithm. Int. J. Comput. Methods Eng. Sci. Mech. 17(5–6), 315–321 (2016)MathSciNetCrossRef Tallón-Ballesteros, A.J., Ibiza-Granados, A.: Simplifying pattern recognition problems via a scatter search algorithm. Int. J. Comput. Methods Eng. Sci. Mech. 17(5–6), 315–321 (2016)MathSciNetCrossRef
23.
go back to reference Tallón-Ballesteros, A.J., Riquelme, J.C.: Data mining methods applied to a digital forensics task for supervised machine learning. In: Muda, A.K., Choo, Y.-H., Abraham, A., N. Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. SCI, vol. 555, pp. 413–428. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05885-6_17CrossRef Tallón-Ballesteros, A.J., Riquelme, J.C.: Data mining methods applied to a digital forensics task for supervised machine learning. In: Muda, A.K., Choo, Y.-H., Abraham, A., N. Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. SCI, vol. 555, pp. 413–428. Springer, Cham (2014). https://​doi.​org/​10.​1007/​978-3-319-05885-6_​17CrossRef
24.
go back to reference Tallón-Ballesteros, A.J., Riquelme, J.C.: Low dimensionality or same subsets as a result of feature selection: an in-depth roadmap. In: Ferrández Vicente, J.M., Álvarez-Sánchez, J.R., de la Paz López, F., Toledo Moreo, J., Adeli, H. (eds.) IWINAC 2017. LNCS, vol. 10338, pp. 531–539. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59773-7_54CrossRef Tallón-Ballesteros, A.J., Riquelme, J.C.: Low dimensionality or same subsets as a result of feature selection: an in-depth roadmap. In: Ferrández Vicente, J.M., Álvarez-Sánchez, J.R., de la Paz López, F., Toledo Moreo, J., Adeli, H. (eds.) IWINAC 2017. LNCS, vol. 10338, pp. 531–539. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-59773-7_​54CrossRef
25.
go back to reference Vargas, E., BluePrints, S.: High availability fundamentals. Sun Blueprints series, pp. 1–17 (2000) Vargas, E., BluePrints, S.: High availability fundamentals. Sun Blueprints series, pp. 1–17 (2000)
27.
go back to reference Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS, vol. 10, p. 2010 (2010) Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS, vol. 10, p. 2010 (2010)
28.
go back to reference Wu, X., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef Wu, X., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef
29.
go back to reference Zhang, J., Pan, Y., Wang, Z., Liu, B.: URL based gateway side phishing detection method, pp. 268–275. IEEE (2016) Zhang, J., Pan, Y., Wang, Z., Liu, B.: URL based gateway side phishing detection method, pp. 268–275. IEEE (2016)
30.
go back to reference Zheng, Z., Webb, G.I.: Lazy learning of Bayesian rules. Mach. Learn. 41(1), 53–84 (2000)CrossRef Zheng, Z., Webb, G.I.: Lazy learning of Bayesian rules. Mach. Learn. 41(1), 53–84 (2000)CrossRef
31.
go back to reference Zouina, M., Outtaj, B.: A novel lightweight URL phishing detection system using SVM and similarity index. Hum. Centric Comput. Inf. Sci. 7(1), 17 (2017)CrossRef Zouina, M., Outtaj, B.: A novel lightweight URL phishing detection system using SVM and similarity index. Hum. Centric Comput. Inf. Sci. 7(1), 17 (2017)CrossRef
Metadata
Title
An Empirical Study on Performance Server Analysis and URL Phishing Prevention to Improve System Management Through Machine Learning
Authors
Antonio J. Tallón-Ballesteros
Simon James Fong
Raymond Kwok-Kay Wong
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-13342-9_17

Premium Partner