2020 IEEE 16th International Conference on Intelligent Computer Communication and Processing (ICCP) 2020
DOI: 10.1109/iccp51029.2020.9266139
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious URLs Based on Machine Learning Algorithms and Word Embeddings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Six different neural network architectural models were developed and compared: Feedforward Neural Network (FNN), Bi-directional RNN (Bi-RNN), Gated Recurrent Unit (GRU), Long Short-Term Memory (LSTM), Recurrent Neural Network (RNN), and Convolutional Neural Network (CNN). These models were chosen based on previous studies, which have shown that these models have demonstrated promising performance in a variety of phishing detection-related applications [22][23][24][25][26].…”
Section: Architecture Performance Comparisonsmentioning
confidence: 99%
“…Six different neural network architectural models were developed and compared: Feedforward Neural Network (FNN), Bi-directional RNN (Bi-RNN), Gated Recurrent Unit (GRU), Long Short-Term Memory (LSTM), Recurrent Neural Network (RNN), and Convolutional Neural Network (CNN). These models were chosen based on previous studies, which have shown that these models have demonstrated promising performance in a variety of phishing detection-related applications [22][23][24][25][26].…”
Section: Architecture Performance Comparisonsmentioning
confidence: 99%
“…A study conducted by Vundavalli et al [45] aimed to distinguish between benign and malicious websites They obtained their dataset from the Kaggle website [46]. The best result was achieved by naive bayes (NB) with an accuracy of 91%.…”
Section: ) Lexical Content-based and Network-based Features Studiesmentioning
confidence: 99%
“…Attackers combine a reflected XSS vulnerability with other types of attacks to boost the effect of exploiting such a vulnerability. This approach has resulted in a new type of computer attack called clickjacking, which tricks a person into clicking a link that is invisible or disguised as some other element [10,11]. Clickjacking has the following features:…”
Section: Reflected Xssmentioning
confidence: 99%