Abstract
This chapter compares three different machine learning techniques, i.e. Gaussian process classification, decision tree classification and support vector classification, based on their ability to learn and detect the attributes of a malicious website. The data used have all been sourced from HTTP headers, WHOIS lookups and DNS records. As a result, this does not require parsing of the website content. The data are first subjected to multiple steps of pre-processing including data formatting, missing value replacement, scaling and principal component analysis.
Original language | English |
---|---|
Title of host publication | Privacy, Security And Forensics in The Internet of Things (IoT) |
Editors | Reza Montasari, Fiona Carroll, Ian Mitchell, Sukhvinder Hara, Rachel Bolton-King |
Publisher | Springer Nature Link |
Pages | 131-147 |
Number of pages | 17 |
ISBN (Electronic) | 978-3-030-91218-5 |
ISBN (Print) | 978-3-030-91217-8, 978-3-030-91220-8 |
DOIs | |
Publication status | E-pub ahead of print - 16 Feb 2022 |