Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Journal of Informatics, Information System, Software Engineering and Applications (INISTA)

Implementation of Random Forest Classification and Support Vector Machine Algorithms for Phishing Link Detection Tampinongkol, Felliks Feiters; Kamila, Ahya Radiatul; Wardhana, Ariq Cahya; Kusuma, Adi Wahyu Candra; Revaldo, Danny
Journal of INISTA Vol 7 No 1 (2024): November 2024
Publisher : LPPM Institut Teknologi Telkom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/inista.v7i1.1588

Abstract

This research compares two machine learning methods, Support Vector Machine (SVM) and Random Forest Classification (RFC), in detecting phishing links. Phishing is an attempt to obtain sensitive information by masquerading as a trustworthy entity in electronic communications. Detecting phishing links is crucial in protecting users from this cyber threat. In this study, we used a dataset consisting of features extracted from URLs, such as URL length, the use of special characters, and domain information. The dataset was then split into training and testing data with an 80:20 ratio. We trained the SVM and RFC models using the training data and evaluated their performance based on the testing data. The results show that both methods have their respective advantages. SVM, known for handling high-dimensional data well and providing optimal solutions for classification problems, demonstrated a high accuracy rate in detecting phishing links. However, SVM requires a longer training time compared to RFC. On the other hand, RFC, an ensemble method known for its resilience to overfitting, showed performance nearly comparable to SVM in terms of accuracy but with faster training time and better interpretability. This comparison indicates that RFC is more suitable for scenarios requiring quick results and easy interpretation, while SVM is more appropriate for situations where accuracy is critical, and computational resources are sufficient. In conclusion, the choice of phishing link detection method should be tailored to specific needs and available resource constraints. This research provides valuable insights for developing more effective, efficient, and relevant phishing detection systems.
Co-Authors Ade Yanyan Ramdhani Aditya Abi Riestianto Aditya Pratomo Sutrisno Afzal Ziqri Agustyn, Zulfa Basmallah Aiza Yudha Pratama Ajeng Dyah Kurniawati Akhmad Jayadi Al Fikri, Mufid Alhakim, Rahmat Alon Jala Tirta Segara Ananda Rifkiy Hasan Andhika Prasetyo Utomo Andi Prademon Yunus Anggraini, Nenny Arif Riyandi Aufa Rizka Azzumi Aulia Hanafi, Alya Auliya Burhanuddin Bagus Aryandra, Brahmasta Bintang Ahmada Farhan Adama Cepi Ramdani Cintiari Devi , Pramita Condro Kartiko Denny Saputra Deny Saputra Diovianto Putra Rakhmadani Fadlan Sani Mubarok Faisal Dharma Adhinata Fala Sifah Maharani Fauzan Romadlon Gracia Rizka Pasfica Hasan, Thowaf Fuad Hesa Abda Arrasyid I Anna Tul Munikhah Imam M Shofi Jilly Ayu Puspita Kahfi Del Vieri Kamila, Ahya Radiatul Kukuh Pramadito Raharjo Kusuma, Adi Wahyu Candra Latief, Muhammad Abdul Luh Kesuma Wardhani Maie Istighosah Melani Eka Rahayu Muhammad Amien Sidiq Muhammad Ridwan Muhammad Yusuf Nurpariz Nashrul Hakiem Nastiti Nur Indrayani Nenny Anggraini, Nenny Novian Adi Prasetya Novian Adi Prasetyo Nurul Adila Pambudi, Wendri Tri Puspa Diah Narendri, Azelia Restu Indrawan Prabawa, I Putu Revaldo, Danny Rifki Adhitama, Rifki Rini Adelina Siagian Rizki Hadi, Rizki Rosalina Alda Rozy, Nurul Faizah Siti Ummi Masruroh Sofia, Martryatus Sri Wahjuni Suparyo Suparyo Syifa' Septiana Dwi Inayah Tampinongkol, Felliks Feiters Teguh Rijanandi Teguh Rijanandi Tenia Wahyuningrum Teotino Gomes Soares Tio Fani Tio Fani Wahyu Andi Saputra Windi Septiani Yani Nurhadryani Yogo Dwi Prasetyo Yolanda Al Hidayah Pasaribu Yudha Islami Sulistya Yuliani, Asty