Research Article
Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software
Table 2
Malicious URLs detected in Phase 1 (preprocessing phase).
| Number | Malicious URL | Requests | Access time (h) | Requests per second | Count | Percent |
| 1 | URL1 | 237,291 | 1.71% | 2.04 | 32.38 | 2 | URL2 | 80,903 | 0.58% | 0.68 | 32.98 | 3 | URL3 | 80,032 | 0.58% | 24.00 | 0.93 | 4 | URL4 | 303,633 | 2.18% | 10.56 | 7.98 | 5 | URL5 | 81,256 | 0.58% | 24.00 | 0.94 | 6 | URL6 | 149,966 | 1.08% | 12.53 | 3.32 | 7 | URL7 | 496,781 | 3.57% | 4.40 | 31.39 | 8 | URL8 | 364,809 | 2.62% | 11.69 | 8.67 | 9 | URL9 | 80,761 | 0.58% | 24.00 | 0.93 | 10 | URL10 | 297,938 | 2.14% | 16.65 | 4.97 | 11 | URL11 | 80,423 | 0.58% | 24.00 | 0.93 | 12 | URL12 | 71,004 | 0.51% | 24.00 | 0.82 | 13 | URL13 | 80,549 | 0.58% | 24.00 | 0.93 | 14 | URL14 | 81,040 | 0.58% | 24.00 | 0.94 |
| Total | 2,486,386 | 17.88% | ā | ā |
|
|