Detección de URLs maliciosas por medio de técnicas de aprendizaje automático

dc.contributor.advisorSalcedo Parra, Octavio José
dc.contributor.advisorSalazar Herrera, Carlos Alberto
dc.contributor.authorCéspedes Maestre, María Martha
dc.date.accessioned2021-06-25T03:01:19Z
dc.date.available2021-06-25T03:01:19Z
dc.date.issued2021-05
dc.descriptionDocumento con toda la información relevante de la investigaciónspa
dc.descriptionIlustraciones, gráficos
dc.description.abstractEn la actualidad, los ciberdelincuentes perpetran ataques web de forma sencilla, en los que aplican diferentes vectores para poner en peligro la seguridad de la información y en los que entienden al ser humano como un flanco fácil para lograr sus objetivos. Generalmente, los usuarios de internet deben realizar una acción que permita el éxito del ataque, por ejemplo, dar clic a alguna URL. Es por lo anterior, que muchos esfuerzos están dirigidos a encontrar técnicas que mitiguen esta problemática y se apuestan grandes cantidades de dinero en generar soluciones. Tomando como referencia el uso de listas negras, la clasificación heurística, y, prestando especial atención a las técnicas de aprendizaje automático capaces de detectar ataques de día cero, en el presente trabajo se despliega un diseño de detección de URLs maliciosas, haciendo uso de criterios léxicos y de ofuscación de la URL. Estas, clasificadas por medio de técnicas de aprendizaje automático como Logistic Regression, Support Vector Machine y Random Forest; demostrando que los tres clasificadores implementados mantienen una relación de eficacia y rendimiento con porcentajes de precisión del 98%, y, tiempos de respuesta satisfactorio. Es preciso aclarar que Random Forest puede estar sujeto a mejoras, ya que se pretende detectar de manera automática las URLs maliciosas y este clasificador tarda en promedio 16 segundos en hacerlo. Como resultado general del diseño, se obtiene un modelo de libre distribución que puede ser utilizado de forma masiva por diferentes usuarios en la red, capaz de detectar de forma precisa URLs maliciosas.spa
dc.description.abstractToday, cybercriminals carry out web attacks in a simple way, in which they apply different vectors to endanger information security and in which they understand the human being as an easy flank to achieve their objectives. Generally, Internet users must take an action that allows the attack to succeed, for example, clicking on a URL. This is why many efforts are aimed at finding techniques that mitigate this problem and large amount of money are bet on generating solutions. Taking as a reference the use of blacklists, heuristic classification, and, paying special attention to machine learning techniques capable of detecting zero-day attacks, in this work a design for detecting malicious URLs is deployed, making use of criteria Lexical and URL obfuscation. These, classified by means of machine learning techniques such as Logistic Regression, Support Vector Machine and Random Forest; demonstrating that the three implemented classifiers maintain an efficiency and performance ratio with 98% accuracy percentages, and satisfactory response times. It should be clarified that Random Forest may be subject to improvements, since it is intended to automatically detect malicious URLs and this classifier takes an average of 16 seconds to do so. As a general result of the design, a free distribution model is obtained that can be used an masse by different users on the network, capable of accurately detecting malicious URLs.eng
dc.description.degreelevelMaestríaspa
dc.description.degreenameMagíster en Telecomunicacionesspa
dc.description.methodsLa metodología que se usa para el diseño del modelo es una metodología cuantitativa, la cual es un enfoque de la ingeniería de software centrada en estrategias experimentales con cumplimiento de procedimientos basados en etapa. Tomando como referencia los atributos claves para detección sólida de phishing, se construye una metodología que permita dar cumplimiento a cada uno de los objetivos trazados, las etapas usadas son: Naturaleza y origen de los datos Extracción de características Métodos de clasificación Configuración o metodología experimentalspa
dc.description.researchareaSeguridad Informáticaspa
dc.format.mimetypeapplication/pdfspa
dc.identifier.instnameUniversidad Nacional de Colombiaspa
dc.identifier.reponameRepositorio Institucional Universidad Nacional de Colombiaspa
dc.identifier.repourlhttps://repositorio.unal.edu.co/spa
dc.identifier.urihttps://repositorio.unal.edu.co/handle/unal/79722
dc.language.isospaspa
dc.publisherUniversidad Nacional de Colombiaspa
dc.publisher.branchUniversidad Nacional de Colombia - Sede Bogotáspa
dc.publisher.departmentDepartamento de Ingeniería de Sistemas e Industrialspa
dc.publisher.facultyFacultad de Ingenieríaspa
dc.publisher.placeBogotá, Colombiaspa
dc.publisher.programBogotá - Ingeniería - Maestría en Ingeniería - Telecomunicacionesspa
dc.relation.references[API navegación segura Google, 2010]API de navegación segura de Google: Google Code ,2010, [en línea] Disponible: http://code.google.com/apis/safebrowsing/spa
dc.relation.references[Akiyama et al., 2017] Akiyama, M., Yagi, T., Yada, T., Mori, T., & Kadobayashi, Y. (2017). Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Computers & Security, 69, 155–173. doi:10.1016/j.cose.2017.01.003spa
dc.relation.references[Bahnsen et al., 2017] Bahnsen, Alejandro Correa; Bohorquez, Eduardo Contreras; Villegas, Sergio; Vargas, Javier; Gonzalez, Fabio A. (2017). [IEEE 2017 APWG Symposium on Electronic Crime Research (eCrime) - Pheonix, AZ, USA (2017.4.25-2017.4.27)] 2017 APWG Symposium on Electronic Crime Research (eCrime) - Classifying phishing URLs using recurrent neural networks. , (), 1–8.doi:10.1109/ECRIME.2017.7945048.spa
dc.relation.references[Basit et al., 2020] Basit, A., Zafar, M., Liu, X. Una encuesta completa de las técnicas de detección de ataques de phishing habilitadas por IA. Telecommun Syst (2020). doi:10.1007/s11235-020-00733-2spa
dc.relation.references[Berners-Lee, et al., 1994] Berners-Lee, T., Masinter, L., McCahil, M. (1994). “Uniform Resource Locators (URL)” , RFC 1738, diciembre de 1994spa
dc.relation.references[Berners-Lee, 1994] Berners-Lee, T. (1994). “Universal Resource Identifiers in WWW: A Sintaxis unificadora para la expresión de nombres y direcciones de Objetos en la red utilizados en la World-Wide Web”, RFC 1630, CERN, junio de 1994.spa
dc.relation.references[Berners-Lee, 2005] Berners-Lee, T. (2005). “Uniform Resource Identifier (URI): Generic Syntax”, RFC 3986, CERN, enero de 2005.spa
dc.relation.references[Bezzera and Feitosa, 2015] Bezzera, M. Feitosa, E., (2015). Investigando o uso de Características na Detecção de URLs Maliciosas. XV Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais — SBSeg 2015.spa
dc.relation.references[Bhagwat et al., 2019] Bhagwat, A., Lodhi, K., Dalvi, S., & Kulkarni, U. (2019). An implemention of a mechanism for malicious URLs detection. In Proceedings of the 2019 6th International Conference on Computing for Sustainable Global Development, INDIACom 2019 (pp. 1008–1013). Institute of Electrical and Electronics Engineers Inc.spa
dc.relation.references[Breiman, 2001] Breiman, L. (2001). Machine Learning, 45(1), 5–32. doi:10.1023/a:1010933404324spa
dc.relation.references[Burgess et al., 2020] J. Burgess, D. Carlin, P. O'Kane y S. Sezer, "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic", Conferencia IEEE de 2020 sobre comunicaciones y seguridad de redes (CNS) , Avignon, Francia, 2020, págs. 1-9, doi: 10.1109 / CNS48642.2020.9162304.spa
dc.relation.references[Cheng and Greiner, 1999] Cheng, J. & Greiner, R. (1999). Comparing Bayesian Network Classifiers. UAI'99: Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, July 1999 Pages 101–108spa
dc.relation.references[Chen et al., 2019] Chen, W., Zeng, Y., & Qiu, M. (2019). Using Adversarial Examples to Bypass Deep Learning Based URL Detection System. 2019 IEEE International Conference on Smart Cloud (SmartCloud). doi:10.1109/smartcloud.2019.00031spa
dc.relation.references[Chiew et al., 2018] Chiew, K. L., Yong, K. S. C., & Tan, C. L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106, 1–20. doi: 10.1016/j.eswa.2018.03.050spa
dc.relation.references[Cisco, 2018] Reporte Anual de Ciberseguridad,2018, [en línea] Disponible: https://www.cisco.com/c/dam/global/es_mx/solutions/pdf/reporte-anual-cisco-2018-espan.pdfspa
dc.relation.references[Cutler and Zhao, 2001] Cutler, A., & Zhao, G. (2001). PERT – Perfect Random Tree Ensembles.spa
dc.relation.references[Das et al., 2019] Das, A., Baki, S., El Aassal, A., Verma, R., & Dunbar, A. (2019). SoK: A Comprehensive Reexamination of Phishing Research from the Security Perspective. IEEE Communications Surveys & Tutorials, 1–1. doi:10.1109/comst.2019.2957750spa
dc.relation.references[DNS-BH, s.f.] DNS-BH malware Domains. (s.f.). DNS-BH Malware Domains Blocklist by RiskAnalytics http://mirror1.malwaredomains.com/files/domains.txtspa
dc.relation.references[Elwell and Polikar, 2011] Elwell, R., & Polikar, R. (2011). Incremental Learning of Concept Drift in Nonstationary Environments. IEEE Transactions on Neural Networks, 22(10), 1517–1531. doi:10.1109/tnn.2011.2160459spa
dc.relation.referencesFayrix, s.f.] Fayrix. (s.f.). “Selección de métricas para aprendizaje automático”. https://fayrix.com/machine-learning-metrics_esspa
dc.relation.references[Filtro SmartScreen Microsoft, 2011] Filtro SmartScreen - Microsoft Windows, 2011, [en línea] Disponible: https://support.microsoft.com/es-us/help/17443/windows-internet-explorer-smartscreen-faqspa
dc.relation.references[Friedman et al., 1997] Friedman, N., Geiger, D. & Goldszmidt, M. Bayesian Network Classifiers. Machine Learning 29, 131–163 (1997). doi: 10.1023/A:1007465528199spa
dc.relation.references[Garera et al., 2007] Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007). A framework for detection and measurement of phishing attacks. Proceedings of the 2007 ACM Workshop on Recurring Malcode - WORM ’07. doi:10.1145/1314389.1314391spa
dc.relation.references[Ghafir and Prenosil, 2015] Ghafir, I., & Prenosil, V. (2015). Blacklist-based malicious IP traffic detection. 2015 Global Conference on Communication Technologies (GCCT). doi:10.1109/gcct.2015.7342657spa
dc.relation.references[Goodfellow et al., 2016] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning [Libro electrónico]. MIT Press. http://www.deeplearningbook.orgspa
dc.relation.references[Gowtham et al., 2014] Gowtham, R.; Krishnamurthi, Ilango (2014). A comprehensive and efficacious architecture for detecting phishing webpages. Computers & Security, 40(), 23–37. doi:10.1016/j.cose.2013.10.004spa
dc.relation.references[Kan and Thi, 2005] Kan, M.-Y., & Thi, H. O. N. (2005). Fast webpage classification using URL features. Proceedings of the 14th ACM International Conference on Information and Knowledge Management - CIKM ’05. doi:10.1145/1099554.1099649spa
dc.relation.references[Khonji et al.,2013] Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing Detection: A Literature Survey. IEEE Communications Surveys & Tutorials, 15(4), 2091–2121. doi:10.1109/surv.2013.032213.00009spa
dc.relation.references[Khor et al., 2010] Khor, K. C., Ting, C. Y., & Phon-Amnuaisuk, S. (2010). Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection. 2010 Second International Conference on Computer Engineering and Applications. doi:10.1109/iccea.2010.214spa
dc.relation.references[Kim et al.,2018] Kim, S., Kim, J., & Kang, B. B. (2018). Malicious URL protection based on attackers’ habitual behavioral analysis. Computers & Security. doi: 10.1016/j.cose.2018.01.013spa
dc.relation.references[Kolosnjaji et al., 2016] Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2016). Deep Learning for Classification of Malware System Call Sequences. Lecture Notes in Computer Science, 137–149. doi:10.1007/978-3-319-50127-7_11spa
dc.relation.references[Kühnel and Meyer, 2016] Kühnel, M., & Meyer, U. (2016). Applying highly space efficient blacklisting to mobile malware. Logic Journal of IGPL, 24(6), 971–981. doi:10.1093/jigpal/jzw052spa
dc.relation.references[Landwehr et al., 2005] Landwehr N., Hall M., & Frank E. (2005). Logistic Model Trees. Machine Learning, 59, 161–205, 2005spa
dc.relation.references[Latorre, 2018] Latorre M. (2018) Universidad Marcelino Champagnat, [en línea]. Disponible: http://umch.edu.pe/arch/hnomarino/74_Historia%20de%20la%20Web.pdfspa
dc.relation.references[Lee and Kim, 2013] Lee, S., & Kim, J. (2013). Fluxing botnet command and control channels with URL shortening services. Computer Communications, 36(3), 320–332. doi: 10.1016/j.comcom.2012.10.003spa
dc.relation.references[Lin et al., 2013] Lin, M.-S., Chiu, C.-Y., Lee, Y.-J., & Pao, H.-K. (2013). Malicious URL filtering — A big data application. 2013 IEEE International Conference on Big Data. doi:10.1109/bigdata.2013.6691627spa
dc.relation.references[Ma et al., 2009] Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009). Beyond blacklists. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’09. doi:10.1145/1557019.1557153spa
dc.relation.references[Majestic, s.f.] Majestic. (s.f.). The Majestic Million (Formato CSV) https://majestic.com/reports/majestic-millionspa
dc.relation.references[Mamun et al., 2016] Mamun, M. S. I., Rathore, M. A., Lashkari, A. H., Stakhanova, N., & Ghorbani, A. A. (2016). Detecting Malicious URLs Using Lexical Analysis. Network & System Security (9783319462974), 467spa
dc.relation.references[Manjeri et al., 2019] Manjeri, A. S., R, K., MNV, A., & Nair, P. C. (2019). A Machine Learning Approach for Detecting Malicious Websites using URL Features. 2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA). doi:10.1109/iceca.2019.8821879spa
dc.relation.references[Mohammad et al., 2015] Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Tutorial and critical analysis of phishing websites methods. Computer Science Review, 17, 1–24. doi: 10.1016/j.cosrev.2015.04.001spa
dc.relation.references[Nguyen et al., 2013] Nguyen, L. A. T., To, B. L., Nguyen, H. K., & Nguyen, M. H. (2013). Detecting phishing web sites: A heuristic URL-based approach. 2013 International Conference on Advanced Technologies for Communications (ATC 2013). doi:10.1109/atc.2013.6698185spa
dc.relation.references[OpenPhish, s.f.] OpenPhish. (s.f.). “Actividad global de phishing”. Phishing Feeds. https://openphish.com/spa
dc.relation.references[Pedregosa et al., 2011] Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830.spa
dc.relation.references[PhishTank, s.f.] PhishTank. (s.f.). Developers. “Developer Information”. (Formato CSV) https://www.phishtank.com/spa
dc.relation.references[PhishTank, 2006] PhishTank,2006 [en línea] Disponible: http://phishtank.org/spa
dc.relation.references[Prakash et al., 2010] Prakash, P., Kumar, M., Kompella, R. R., & Gupta, M. (2010). PhishNet: Predictive Blacklisting to Detect Phishing Attacks. 2010 Proceedings IEEE INFOCOM. doi:10.1109/infcom.2010.5462216spa
dc.relation.references[Python, 2021.] Python (24 de febrero 2021). “What´s New In Python 3.9”. Python. https://docs.python.org/3.9/whatsnew/3.9.htmlspa
dc.relation.references[Python, 2021.] Python (24 de febrero 2021). “re-Operaciones con expresiones regulares”. Python. https://docs.python.org/es/3/library/re.htmlspa
dc.relation.references[Python, 2021.] Python (24 de febrero 2021). “math-Funciones matemáticas”. Python. https://docs.python.org/es/3.10/library/math.htmlspa
dc.relation.references[Python, 2021.] Python (24 de febrero 2021). “datatime-Tipos básico de fecha y hora”. Python. https://docs.python.org/es/3/library/datetime.htmlspa
dc.relation.references[Python, 2021.] Python (24 de febrero 2021). “Collections – Tipos de datos de contenedor”. Python. https://docs.python.org/3/library/collections.htmlspa
dc.relation.references[Revista Dinero (7 de abril 2019)]“4 de cada 10 empresas en América Latina sufrieron ciberataques en los últimos años”, 2019[En Línea]Disponible : https://www.dinero.com/tecnologia/articulo/empresas-en-colombia-sufren-de-ataques-ciberneticos-regularmente/273870spa
dc.relation.references[Schapire and Freund, 2012 ] Schapire, R. E., & Freund, Y. (2012). Boosting: Foundations and algorithms. ProQuest Ebook Central https://ebookcentral-proquest-com.ezproxy.javeriana.edu.cospa
dc.relation.references[ScikitLearn, s.f.] ScikitLearn. (s.f.). Extracción de características. “Extracción de características de texto”https://scikit-learn.org/stable/modules/feature_extraction.html#text-feature-extractionspa
dc.relation.references[ScikitLearn, s.f.] ScikitLearn. (s.f.). Scikit-learn. “Machine Learning in Python” https://scikit-learn.org/stable/spa
dc.relation.references[Shai and Shai, 2014, Capitulo 9, p 125] Shai Shalev-Shawart and Shai Ben-David (2014). Undersanding Machine Learning: From Theory to Algorithms. Cambridge University Press. https://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/spa
dc.relation.references[Shai and Shai, 2014, Capitulo 15, p 200] Shai Shalev-Shawart and Shai Ben-David (2014). Undersanding Machine Learning: From Theory to Algorithms. Cambridge University Press. https://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/spa
dc.relation.references[Shai and Shai, 2014, Capitulo 18, p 250] Shai Shalev-Shawart and Shai Ben-David (2014). Undersanding Machine Learning: From Theory to Algorithms. Cambridge University Press. https://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/spa
dc.relation.references[Shubho et al., 2019] Shubho, S. A., Razib, M. R. H., Rudro, N. K., Saha, A. K., Khan, M. S. U., & Ahmed, S. (2019). Performance Analysis of NB Tree, REP Tree and Random Tree Classifiers for Credit Card Fraud Data. 2019 22nd International Conference on Computer and Information Technology (ICCIT). doi:10.1109/iccit48885.2019.9038578spa
dc.relation.references[Silva et al., 2019] Silva, C. M. R. da, Feitosa, E. L., & Garcia, V. C. (2019). Heuristic-based Strategy for Phishing Prediction: A Survey of URL-based approach. Computers & Security, 101613. doi: 10.1016/j.cose.2019.101613spa
dc.relation.references[Singh and Goyal, 2019] Singh, A. K., & Goyal, N. (2019). A Comparison of Machine Learning Attributes for Detecting Malicious Websites. 2019 11th International Conference on Communication Systems & Networks (COMSNETS). doi:10.1109/comsnets.2019.8711133spa
dc.relation.references[Stackoverflow, 2020.] Stackoverflow. (2020). Fayrix. “Tecnologías mas populares”. https://insights.stackoverflow.com/survey/2020#most-popular-technologiesspa
dc.relation.references[UNB, s.f.] UNB: University of New Brunswick. (s.f.). “Canadian Institute for Cybersecurity”. URL dataset (ISCX-URL2016). https://www.unb.ca/cic/datasets/url-2016.htmlspa
dc.relation.references[Vanhoenshoven et al., 2016] Vanhoenshoven, F., Napoles, G., Falcon, R., Vanhoof, K., & Koppen, M. (2016). Detecting malicious URLs using machine learning techniques. 2016 IEEE Symposium Series on Computational Intelligence (SSCI). doi:10.1109/ssci.2016.7850079spa
dc.relation.references[Varoquaux et al. 2015] Varoquaux, G., Buitinck, L., Louppe, G., Grisel, O., Pedregosa, F., & Mueller, A. (2015). Scikit-learn. GetMobile: Mobile Computing and Communications, 19(1), 29–33. doi:10.1145/2786984.2786995spa
dc.relation.references[Vazhayil et al., 2018] Vazhayil, A., Vinayakumar, R., & Soman, K. (2018). Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks. 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). doi:10.1109/icccnt.2018.8494159spa
dc.relation.references[Verma et al., 2015] Verma, R., Kantarcioglu, M., Marchette, D., Leiss, E., & Solorio, T. (2015). Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students. IEEE Security & Privacy, 13(6), 60–65. doi:10.1109/msp.2015.121spa
dc.relation.references[Verma and Dyer, 2015] Verma, R., & Dyer, K. (2015). On the Character of Phishing URLs. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY ’15. doi:10.1145/2699026.2699115spa
dc.relation.references[Wainberg et al., 2016] Wainberg, M., Alipanahi, B., & Frey, B. J. (2016). Are random forests truly the best classifiers? Journal of Machine Learning Research, 17, 1–5spa
dc.relation.references[W3C, s.f.] W3C, World Wide Web Consortium (s.f.). Arquitectura de la World Wide Web, volumen uno [en línea] Disponible: https://www.w3.org/TR/webarch/spa
dc.relation.references[Yuan et al., 2014] Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). Droid-Sec. ACM SIGCOMM Computer Communication Review, 44(4), 371–372. doi:10.1145/2740070.2631434spa
dc.relation.references[Zhang et al., 2008] Zhang, J., Porras, P., & Ullrich, J. (2008). Highly predictive blacklisting. In Proceedings of the 17th USENIX Security Symposium (pp. 107–122). USENIX Association.spa
dc.relation.references[Zhang et al., 2011] Zhang, W., Ding, Y.-X., Tang, Y., & Zhao, B. (2011). Malicious web page detection based on on-line learning algorithm. 2011 International Conference on Machine Learning and Cybernetics. doi:10.1109/icmlc.2011.6016954spa
dc.relation.references[Zhao et al., 2018] Zhao, J., Wang, N., Ma, Q., & Cheng, Z. (2018). Classifying Malicious URLs Using Gated Recurrent Neural Networks. Advances in Intelligent Systems and Computing, 385–394. doi:10.1007/978-3-319-93554-6_36spa
dc.rightsDerechos reservados de autor, 2021
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.licenseAtribución-NoComercial-SinDerivadas 4.0 Internacionalspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/spa
dc.subject.ddc620 - Ingeniería y operaciones afinesspa
dc.subject.ddc000 - Ciencias de la computación, información y obras generalesspa
dc.subject.proposalUniform Resource Locator (URL)eng
dc.subject.proposalFeature extractioneng
dc.subject.proposalMachine Learningeng
dc.subject.proposalLogistic Regressioneng
dc.subject.proposalSupport Vector Machineseng
dc.subject.proposalRandom Foresteng
dc.subject.proposalLocalizador uniforme de recursos (URL)spa
dc.subject.proposalExtracción de característicasspa
dc.subject.proposalAprendizaje automáticospa
dc.subject.proposalRegresión logísticaspa
dc.subject.proposalMáquinas de vectores de soportespa
dc.subject.proposalBosque aleatoriospa
dc.subject.unescoLenguaje de programación
dc.subject.unescoProtección de datos
dc.subject.unescoComputer languages
dc.subject.unescoData protection
dc.titleDetección de URLs maliciosas por medio de técnicas de aprendizaje automáticospa
dc.title.translatedMalicious URL detection using machine learning techniqueseng
dc.typeTrabajo de grado - Maestríaspa
dc.type.coarhttp://purl.org/coar/resource_type/c_bdccspa
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/masterThesisspa
dc.type.versioninfo:eu-repo/semantics/acceptedVersionspa
dcterms.audienceGeneral
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
1094269813.2021.pdf
Tamaño:
15.04 MB
Formato:
Adobe Portable Document Format
Descripción:

Bloque de licencias

Mostrando 1 - 1 de 1
No hay miniatura disponible
Nombre:
license.txt
Tamaño:
3.87 KB
Formato:
Item-specific license agreed upon to submission
Descripción: