| import re
|
| import joblib
|
| import pandas as pd
|
| import numpy as np
|
| from typing import Dict, Any
|
|
|
| _SUSPICIOUS_TOKENS = [
|
| "login", "verify", "secure", "update", "bank", "pay", "account", "webscr"
|
| ]
|
| _IPV4_PATTERN = re.compile(r"(?:\d{1,3}\.){3}\d{1,3}")
|
|
|
|
|
| def _engineer_features(url_series: pd.Series) -> pd.DataFrame:
|
| s = url_series.astype(str)
|
| out = pd.DataFrame(index=s.index)
|
| out["url_len"] = s.str.len().fillna(0)
|
| out["count_dot"] = s.str.count(r"\.")
|
| out["count_hyphen"] = s.str.count("-")
|
| out["count_digit"] = s.str.count(r"\d")
|
| out["count_at"] = s.str.count("@")
|
| out["count_qmark"] = s.str.count("\?")
|
| out["count_eq"] = s.str.count("=")
|
| out["count_slash"] = s.str.count("/")
|
| out["digit_ratio"] = (out["count_digit"] / out["url_len"].replace(0, np.nan)).fillna(0)
|
| out["has_ip"] = s.str.contains(_IPV4_PATTERN).astype(int)
|
| for tok in _SUSPICIOUS_TOKENS:
|
| out[f"has_{tok}"] = s.str.contains(tok, case=False, regex=False).astype(int)
|
| out["starts_https"] = s.str.startswith("https").astype(int)
|
| out["ends_with_exe"] = s.str.endswith(".exe").astype(int)
|
| out["ends_with_zip"] = s.str.endswith(".zip").astype(int)
|
| return out
|
|
|
|
|
| def load_bundle(path: str) -> Dict[str, Any]:
|
| """Load the saved joblib bundle produced by the notebook.
|
|
|
| Returns a dict with keys: model, feature_cols, url_col, label_col, model_type
|
| """
|
| bundle = joblib.load(path)
|
| required = {"model", "feature_cols", "url_col", "label_col", "model_type"}
|
| missing = required - set(bundle.keys())
|
| if missing:
|
| raise ValueError(f"Bundle missing keys: {missing}")
|
| return bundle
|
|
|
|
|
| def predict_url(url: str, bundle: Dict[str, Any], threshold: float = 0.5) -> Dict[str, Any]:
|
| """Predict phishing probability for a single URL using the saved bundle."""
|
| url_col = bundle["url_col"]
|
| feature_cols = bundle["feature_cols"]
|
| model_type = bundle.get("model_type", "xgboost_bst")
|
| model = bundle["model"]
|
|
|
| row = pd.DataFrame({url_col: [url]})
|
| feats = _engineer_features(row[url_col])[feature_cols]
|
|
|
| if model_type == "xgboost_bst":
|
| import xgboost as xgb
|
| dmat = xgb.DMatrix(feats)
|
| proba = float(model.predict(dmat)[0])
|
| elif model_type == "cuml_rf":
|
| try:
|
| import cudf
|
| gfeats = cudf.DataFrame.from_pandas(feats)
|
| proba = float(model.predict_proba(gfeats)[:, 1].to_pandas().values[0])
|
| except Exception as e:
|
| raise RuntimeError("cudf/cuml required for this bundle but not available") from e
|
| else:
|
| proba = float(model.predict_proba(feats)[:, 1][0])
|
|
|
| pred = int(proba >= threshold)
|
| return {
|
| "url": url,
|
| "phishing_probability": proba,
|
| "predicted_label": pred,
|
| "backend": model_type,
|
| }
|
|
|
|
|
| if __name__ == "__main__":
|
|
|
| try:
|
| bundle = load_bundle("rf_url_phishing_xgboost_bst.joblib")
|
| print(
|
| predict_url(
|
| "http://secure-login-account-update.example.com/session?id=123",
|
| bundle=bundle,
|
| )
|
| )
|
| except FileNotFoundError:
|
| print("Bundle not found in current directory. This is expected inside the source repo.")
|
|
|
|
|
|
|