Proceedings of the 2018 VII International Conference on Network, Communication and Computing 2018
DOI: 10.1145/3301326.3301336
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Efficiency of Character-level Convolution Neuron Network and Long Short Term Memory on Malicious URL Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…LSTM is proven to be that it is a powerful technique for detecting phishing URLs (Bahnsen et al, 2017;Chen et al, 2018). Further, Pham et al (2018) have shown that the combination of 1D convolution layer and LSTM layer improves the accuracy, compared to the models that consider only LSTM layers in malicious URL detection. Therefore, this study selected 1D convolutional and LSTM architecture to train the URL features when designing the Model A.…”
Section: Model A: 1d Convolutional and Lstm Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…LSTM is proven to be that it is a powerful technique for detecting phishing URLs (Bahnsen et al, 2017;Chen et al, 2018). Further, Pham et al (2018) have shown that the combination of 1D convolution layer and LSTM layer improves the accuracy, compared to the models that consider only LSTM layers in malicious URL detection. Therefore, this study selected 1D convolutional and LSTM architecture to train the URL features when designing the Model A.…”
Section: Model A: 1d Convolutional and Lstm Modelmentioning
confidence: 99%
“…Further, Chen et al (2018) reported that the CNN approach with the URLs has less accuracy compared to the LSTM. However, Pham et al (2018) stated that a combination of CNN and LSTM could give better results in detecting malicious URLs rather than using only LSTM. Although high accuracy is maintained in these automated malicious URL detection systems, URL shortening services that can hide malicious URLs, benign URLs becoming malicious in the future, and tools which can simulate URLs to bypass these models can be a challenge to have an effective phishing detection in the long run (Sahoo et al, 2017).…”
Section: Software-based Detectionmentioning
confidence: 99%
“…DGAs can be blocked using blacklists, but their coverage is widely deficient and inconsistent most of the time. In the light of artificial intelligence and machine learning, a DGA is examined as a classification issue [40]. DGAs represents 43,12% of the cases tackled with recurrent networks.…”
Section: Domain Generating Algorithmmentioning
confidence: 99%
“…In [43], it is suggested that LSTM DGA are potentially able to learn of much new data from a small number of real samples and it considers the association of reinforcement learning and LSTM with the specific objective of detecting ransomware attack threats (consisting of the attacker encrypting important business information stored on the victim's system, and demanding the payment of a ransom in exchange for the data being decrypted). In a benchmarking model, [40] demonstrate that the classification of DGA has the best precision (with more than 96%) of a CNN-LSTM model in comparison to a simple CNN or LSTM model, and [63] go a step further and incorporate attention mechanism [45] into the LSTM model in order to tackle the problem of long domain expression. The contribution of the attention mechanism is to focus on more important substrings.…”
Section: Domain Generating Algorithmmentioning
confidence: 99%
“…Recently, DNN-MLPUs have gained tremendous popularity in detecting phishing URLs [5,47,50,66,77]. These methods use character and word vectors representations of URLs to train the Deep Neural Networks.…”
Section: Deep Neural Network (Dnn-mlpu)mentioning
confidence: 99%