2021
DOI: 10.1155/2021/5518528
|View full text |Cite
|
Sign up to set email alerts
|

A Malicious URL Detection Model Based on Convolutional Neural Network

Abstract: With the development of Internet technology, network security is under diverse threats. In particular, attackers can spread malicious uniform resource locators (URL) to carry out attacks such as phishing and spam. The research on malicious URL detection is significant for defending against these attacks. However, there are still some problems in the current research. For instance, malicious features cannot be extracted efficiently. Some existing detection methods are easy to evade by attackers. We design a mal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Regarding the problem of detecting phishing URLs, there are two main methods: rule-based detection method and behavior analysis-based detection method [1,2,3]. In which, the behavior-based detection method using machine learning and deep learning algorithms is developing a lot nowadays.…”
Section: Introduction Network Anomaly Detection Methods Are Usually Based Onmentioning
confidence: 99%
See 2 more Smart Citations
“…Regarding the problem of detecting phishing URLs, there are two main methods: rule-based detection method and behavior analysis-based detection method [1,2,3]. In which, the behavior-based detection method using machine learning and deep learning algorithms is developing a lot nowadays.…”
Section: Introduction Network Anomaly Detection Methods Are Usually Based Onmentioning
confidence: 99%
“…Behaviorbased detection methods often seek ways to analyze anomalous behavior based on URL information. Some information is often applied to extract such as [1,3,4,5,6,7,8,9,10] domain, HTTP protocol, body, DNS query, lexical, host-based, etc. In this paper, we propose some new features representing abnormal behaviors of phishing URLs.…”
Section: Introduction Network Anomaly Detection Methods Are Usually Based Onmentioning
confidence: 99%
See 1 more Smart Citation
“…An ensemble model was built aiming to improve the detection rate. Wang et al [ 28 ] proposed a model using Dynamic Convolutional Neural Network (DCNN) for malicious URLs detection. Stating that their model can prevent attackers from passing the current detection model, and the problem of not having the malicious features extracted properly is solved.…”
Section: Literature Reviewmentioning
confidence: 99%
“…al [ 27 ] RD, DT, NB, AdaBoost, KNN, XGBoost, SVM, Ensemble Private 2-Classes XGBoost is a powerful algorithm Fast Approach, Applying ensemble model Good features extraction The main focus was on feature extraction only It might get bypassed in modern ways Wang et. al [ 28 ] DCNN Private 2-Classes Good learning mechanism There is a low possibility of mixing benign and dangerous URLs High accuracy The model is heavy-weight Dark web URLs cannot be classified In real-time, the detection process will affect the network performance Manoj et al [ 29 ] Logistic regression, SVM, XGBoost, MLP, and Auto-Encoders Alexa, Dmoz, personal web history, PhishTank, whois 2-Classes Several classifiers were used Using XGBoost and MLP Good analyzing process Small dataset Low accuracy Slow in real-time Relying on 3rd-parties Rana et al [ 30 ] LMT Phish Tank (2015) 2-Classes Multilayer deep learning Approach for better detection Old and small dataset, Modern phishing URLs might not be detected …”
Section: Literature Reviewmentioning
confidence: 99%