dc.contributor.author |
Ajhari, Abdul Azzam |
|
dc.contributor.author |
Priambodo, Dimas Febriyan |
|
dc.contributor.author |
Paradisa, Radifa Hilya |
|
dc.contributor.author |
Yulianti, Henny |
|
dc.date.accessioned |
2023-09-19T21:50:22Z |
|
dc.date.available |
2023-09-19T21:50:22Z |
|
dc.date.issued |
2023-09-20 |
|
dc.identifier.issn |
2210-142X |
|
dc.identifier.uri |
https://journal.uob.edu.bh:443/handle/123456789/5217 |
|
dc.description.abstract |
Changes in internet usage patterns and behavior that have become increasingly massive since the COVID-19 pandemic
have made hackers have various cybercrime ways to trick their victims. Some of the methods that are still used by hackers are fraud
by utilizing user data with fake websites (phishing) that resemble the original website. The appearance and URL of the website that
deceives the target or potential victim is a scam trick to gain the trust of the target. Therefore, we decided to research by building
a URL detection system with the characteristics of fraud, phishing, and scam website-based using machine learning. Because this
system is preventive in the form of protection, a user-friendly name was created, namely Protective URL Detector (PROCTOR).
PROCTOR uses 52 standard features of website security protocols and is trained to leverage fraud, phishing, and scam data in
Indonesia with random forest (RF) machine learning models. After training, the model is tested and evaluated with new data using the
confusion matrix classification evaluation method. The most optimal model is achieved by the RF model with a training accuracy of 99.91 |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University Of Bahrain |
en_US |
dc.subject |
Cybercrime |
en_US |
dc.subject |
Machine Learning |
en_US |
dc.subject |
Phishing |
en_US |
dc.subject |
Random Forest |
en_US |
dc.subject |
Scam |
en_US |
dc.title |
PROCTOR: A Robust URL Protection System Against Fraudulent, Phishing, and Scam Activities |
en_US |
dc.type |
Article |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.12785/ijcds/140179 |
|
dc.volume |
14 |
en_US |
dc.issue |
1 |
en_US |
dc.pagestart |
1013 |
en_US |
dc.pageend |
1021 |
en_US |
dc.contributor.authorcountry |
Indonesia |
en_US |
dc.contributor.authoraffiliation |
Department of Informatics, Universitas Siber Asia, Jakarta, 12550 |
en_US |
dc.contributor.authoraffiliation |
Cyber Security Engineering,National Cyber and Crypto Polytechnic, Bogor, 16120 |
en_US |
dc.contributor.authoraffiliation |
National Cyber and Crypto Agency, Depok, 16511 |
en_US |
dc.source.title |
International Journal of Computing and Digital Systems |
en_US |
dc.abbreviatedsourcetitle |
IJCDS |
en_US |