An Efficient Hybrid Feature Select Technique towards Prediction of Suspicious URLs in IoT Environment

Authors

  • Battula Manideep Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Gandham Pavan Kumar Reddy Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Golla Ajay Kumar Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Kalle Shiva Shankar Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author
  • Dr. Dhanaraj Cheelu Department of Artificial Intelligence and Machine Learning, Dr K V Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India Author

DOI:

https://doi.org/10.32628/CSEIT2511316

Keywords:

Suspicious URLs, IoT Security, Hybrid Feature Selection, Machine Learning, Cyber Threat Detection

Abstract

the evolving landscape of the Internet of Things (IoT), securing network-connected devices from cyber threats has become a critical concern. Among these threats, malicious URLs pose a significant risk by facilitating phishing, data theft, and malware attacks. This paper proposes an efficient hybrid feature selection technique aimed at enhancing the prediction of suspicious URLs within an IoT environment. The hybrid approach combines filter and wrapper-based methods to extract the most relevant features from large and complex URL datasets. By applying machine learning classifiers such as Random Forest and Support Vector Machines (SVM), the system demonstrates improved accuracy, reduced false positive rates, and faster detection times. The proposed technique optimizes feature space, reduces computational cost, and increases prediction reliability, making it highly suitable for real-time threat detection in resource-constrained IoT devices.

Downloads

Download data is not yet available.

References

‘APWG | Unifying The Global Response To Cybercrime’ (n.d.) available: https://apwg.org/

14 Types of Phishing Attacks That IT Administrators Should Watch For [online] (2021)https://www.blog.syscloud.com,available:https://www.blog.syscloud.comtypes-o f-phishing/

Lakshmanarao, A., Rao, P.S.P., Krishna, M.M.B. (2021) ‘Phishing website detection using novel machine learning fusion approach’, in 2021 International ConferenceonArtificialIntelligenceandSmartSystems(ICAIS),Presentedatthe2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 1164– 1169

H.Chapla,R.KotakandM.Joiser,"AMachineLearningApproachforURLBased Web Phishing Using Fuzzy Logic as Classifier", 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 383-388, 2019, July

Vaishnavi, D., Suwetha, S., Jinila, Y.B., Subhashini, R., Shyry, S.P. (2021) ‘A ComparativeAnalysisofMachineLearningAlgorithmsonMaliciousURLPrediction’, in 2021 5th International Conference on Intelligent Computing and ControlSystems (ICICCS),Presentedatthe20215thInternationalConferenceonIntelligentComputing and Control Systems (ICICCS), 1398–1402

Microsoft,MicrosoftConsumersafety report. https://news.microsoft.com/ensg/2014/02/11/microsoft-consumersafety-index-reveals- impact-of-poor-online-safety-behaviours-in-singapore/sm.001xdu50tlxsej410r11kqvks u4nz.

Internal Revenue Service, IRS E-mail Schemes. Available at https://www.irs.gov/uac/newsroom/consumers-warnedof-new-surge-in-irs-email-schem es-during-2016-tax-season-tax-industry-also-targeted.

Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S. (2007), A comparison of machine learning techniques for phishing detection. Proceedingsof theAnti-phishingWorkingGroups2ndAnnualECrime Researchers Summit on - ECrime ’07.doi:10.1145/1299015.1299021.

E.,B.,K.,T.(2015).,PhishingURLDetection:AMachineLearningandWeb Mining-based Approach. International Journal ofComputerApplications,123(13),46-50.doi:10.5120/ijca2015905665.

WangWei-Hong,LVYin-Jun,CHENHui-Bing,FANGZhao-Lin.,AStatic Malicious Javascript Detection Using SVM, InProceedings of the 2nd International Conference on Computer Science and Electrical Engineering (ICCSEE 2013).

Downloads

Published

08-05-2025

Issue

Section

Research Articles