An Efficient Hybrid Feature Select Technique towards Prediction of Suspicious URLs in IoT Environment
DOI:
https://doi.org/10.32628/CSEIT2511316Keywords:
Suspicious URLs, IoT Security, Hybrid Feature Selection, Machine Learning, Cyber Threat DetectionAbstract
the evolving landscape of the Internet of Things (IoT), securing network-connected devices from cyber threats has become a critical concern. Among these threats, malicious URLs pose a significant risk by facilitating phishing, data theft, and malware attacks. This paper proposes an efficient hybrid feature selection technique aimed at enhancing the prediction of suspicious URLs within an IoT environment. The hybrid approach combines filter and wrapper-based methods to extract the most relevant features from large and complex URL datasets. By applying machine learning classifiers such as Random Forest and Support Vector Machines (SVM), the system demonstrates improved accuracy, reduced false positive rates, and faster detection times. The proposed technique optimizes feature space, reduces computational cost, and increases prediction reliability, making it highly suitable for real-time threat detection in resource-constrained IoT devices.
Downloads
References
‘APWG | Unifying The Global Response To Cybercrime’ (n.d.) available: https://apwg.org/
14 Types of Phishing Attacks That IT Administrators Should Watch For [online] (2021)https://www.blog.syscloud.com,available:https://www.blog.syscloud.comtypes-o f-phishing/
Lakshmanarao, A., Rao, P.S.P., Krishna, M.M.B. (2021) ‘Phishing website detection using novel machine learning fusion approach’, in 2021 International ConferenceonArtificialIntelligenceandSmartSystems(ICAIS),Presentedatthe2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 1164– 1169
H.Chapla,R.KotakandM.Joiser,"AMachineLearningApproachforURLBased Web Phishing Using Fuzzy Logic as Classifier", 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 383-388, 2019, July
Vaishnavi, D., Suwetha, S., Jinila, Y.B., Subhashini, R., Shyry, S.P. (2021) ‘A ComparativeAnalysisofMachineLearningAlgorithmsonMaliciousURLPrediction’, in 2021 5th International Conference on Intelligent Computing and ControlSystems (ICICCS),Presentedatthe20215thInternationalConferenceonIntelligentComputing and Control Systems (ICICCS), 1398–1402
Microsoft,MicrosoftConsumersafety report. https://news.microsoft.com/ensg/2014/02/11/microsoft-consumersafety-index-reveals- impact-of-poor-online-safety-behaviours-in-singapore/sm.001xdu50tlxsej410r11kqvks u4nz.
Internal Revenue Service, IRS E-mail Schemes. Available at https://www.irs.gov/uac/newsroom/consumers-warnedof-new-surge-in-irs-email-schem es-during-2016-tax-season-tax-industry-also-targeted.
Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S. (2007), A comparison of machine learning techniques for phishing detection. Proceedingsof theAnti-phishingWorkingGroups2ndAnnualECrime Researchers Summit on - ECrime ’07.doi:10.1145/1299015.1299021.
E.,B.,K.,T.(2015).,PhishingURLDetection:AMachineLearningandWeb Mining-based Approach. International Journal ofComputerApplications,123(13),46-50.doi:10.5120/ijca2015905665.
WangWei-Hong,LVYin-Jun,CHENHui-Bing,FANGZhao-Lin.,AStatic Malicious Javascript Detection Using SVM, InProceedings of the 2nd International Conference on Computer Science and Electrical Engineering (ICCSEE 2013).
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.