With the development of Internet technology, network security is under diverse threats. In particular, attackers can spread malicious uniform resource locators (URL) to carry out attacks such as phishing and spam. The research on malicious URL detection is significant for defending against these attacks. However, there are still some problems in the current research. For instance, malicious features cannot be extracted efficiently. Some existing detection methods are easy to evade by attackers. We design a malicious URL detection model based on a dynamic convolutional neural network (DCNN) to solve these problems. A new folding layer is added to the original multilayer convolution network. It replaces the pooling layer with the k-max-pooling layer. In the dynamic convolution algorithm, the width of feature mapping in the middle layer depends on the vector input dimension. Moreover, the pooling layer parameters are dynamically adjusted according to the length of the URL input and the depth of the current convolution layer, which is beneficial to extracting more in-depth features in a wider range. In this paper, we propose a new embedding method in which word embedding based on character embedding is leveraged to learn the vector representation of a URL. Meanwhile, we conduct two groups of comparative experiments. First, we conduct three contrast experiments, which adopt the same network structure and different embedding methods. The results prove that word embedding based on character embedding can achieve higher accuracy. We then conduct the other three experiences, which use the same embedding method proposed in this paper and use different network structures to determine which network is most suitable for our model. We verify that the model designed in this paper has the highest accuracy (98%) in detecting malicious URL through these experiences.
Device fingerprint is information about the target computing device for the purpose of identification. The fingerprinting algorithm that how to assimilate the target into an identifier has been well studied for more than 20 years. However, the recent obfuscation method against device fingerprinting makes collecting this information more difficult. In order to solve these problems, this paper proposes a new type of fingerprinting method that relies on the resonant frequency response of the gyroscope. Our method first generates an ultrasonic as the trigger signal and obtains the sensor's output through the application program or the web browser as the response. After the sensor output being normalized during the data preprocessing, resonance features are extracted after frequency domain analysis. Finally, the mobile device is identified through these features matching. In the experiment, we test many types of mobile phones to demonstrate that our method is feasible while users are unaware of this process. For instance, we find that some features are stable when the posture of the mobile device or the time change. There are 10 features based on resonance frequency that can help us improve the classification accuracy to 96.5%. The comprehensive experiments demonstrate that our method can effectively distinguish different types of mobile devices. Even if it is the same model of mobile devices with the same type of gyroscopes, this method still has a good performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.