University of Bahrain
Scientific Journals

PROCTOR: A Robust URL Protection System Against Fraudulent, Phishing, and Scam Activities

Show simple item record

dc.contributor.author Ajhari, Abdul Azzam
dc.contributor.author Priambodo, Dimas Febriyan
dc.contributor.author Paradisa, Radifa Hilya
dc.contributor.author Yulianti, Henny
dc.date.accessioned 2023-09-19T21:50:22Z
dc.date.available 2023-09-19T21:50:22Z
dc.date.issued 2023-09-20
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5217
dc.description.abstract Changes in internet usage patterns and behavior that have become increasingly massive since the COVID-19 pandemic have made hackers have various cybercrime ways to trick their victims. Some of the methods that are still used by hackers are fraud by utilizing user data with fake websites (phishing) that resemble the original website. The appearance and URL of the website that deceives the target or potential victim is a scam trick to gain the trust of the target. Therefore, we decided to research by building a URL detection system with the characteristics of fraud, phishing, and scam website-based using machine learning. Because this system is preventive in the form of protection, a user-friendly name was created, namely Protective URL Detector (PROCTOR). PROCTOR uses 52 standard features of website security protocols and is trained to leverage fraud, phishing, and scam data in Indonesia with random forest (RF) machine learning models. After training, the model is tested and evaluated with new data using the confusion matrix classification evaluation method. The most optimal model is achieved by the RF model with a training accuracy of 99.91 en_US
dc.language.iso en en_US
dc.publisher University Of Bahrain en_US
dc.subject Cybercrime en_US
dc.subject Machine Learning en_US
dc.subject Phishing en_US
dc.subject Random Forest en_US
dc.subject Scam en_US
dc.title PROCTOR: A Robust URL Protection System Against Fraudulent, Phishing, and Scam Activities en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/140179
dc.volume 14 en_US
dc.issue 1 en_US
dc.pagestart 1013 en_US
dc.pageend 1021 en_US
dc.contributor.authorcountry Indonesia en_US
dc.contributor.authoraffiliation Department of Informatics, Universitas Siber Asia, Jakarta, 12550 en_US
dc.contributor.authoraffiliation Cyber Security Engineering,National Cyber and Crypto Polytechnic, Bogor, 16120 en_US
dc.contributor.authoraffiliation National Cyber and Crypto Agency, Depok, 16511 en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account