2021
DOI: 10.3390/e23020182
|View full text |Cite
|
Sign up to set email alerts
|

Malicious URL Detection Based on Associative Classification

Abstract: Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access to a network, ex-filtrate sensitive information, and secretly monitor targeted computer systems. In this paper, a data mining approach known as classification based on association (CBA) to detect malicious URLs using URL and webpage content features is present… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Behaviorbased detection methods often seek ways to analyze anomalous behavior based on URL information. Some information is often applied to extract such as [1,3,4,5,6,7,8,9,10] domain, HTTP protocol, body, DNS query, lexical, host-based, etc. In this paper, we propose some new features representing abnormal behaviors of phishing URLs.…”
Section: Introduction Network Anomaly Detection Methods Are Usually Based Onmentioning
confidence: 99%
See 1 more Smart Citation
“…Behaviorbased detection methods often seek ways to analyze anomalous behavior based on URL information. Some information is often applied to extract such as [1,3,4,5,6,7,8,9,10] domain, HTTP protocol, body, DNS query, lexical, host-based, etc. In this paper, we propose some new features representing abnormal behaviors of phishing URLs.…”
Section: Introduction Network Anomaly Detection Methods Are Usually Based Onmentioning
confidence: 99%
“…In the experimental part, the authors conducted experiments and proved that this proposal is superior to other methods using convolutional neural networks. In addition, the study [4] also proposed a detection method based on Associative Classification. Specifically, in this study, the author used some abnormal behavior of URLs including URL Features, Webpage Content Features.…”
Section: Related Workmentioning
confidence: 99%
“…The best result achieved was by RF with 95% accuracy, 95.4% recall, and 95.3% precision. Along the same line, Kumi et al [ 7 ] proposed a method to classify URLs as either malicious or benign using a dataset collected by Manjeri et al [ 6 ]. The dataset was divided into 1,565 Benign URLs and 216 Malicious URLs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Precision is finding out how many of the classes predicted as positive are actually positive and is computed by (6) Count_-Recall is the ratio of classes predicted correctly out of all the positive classes and is computed by (7) below:…”
Section: Evaluation Criteriamentioning
confidence: 99%
“…The hybrid algorithm uses the strengths of both the rule induction algorithm (JRip) and the projective adaptive resonance theory (PART) algorithm to produce rule sets. Their dataset was collected from PhishTank [14], Yahoo, Alexa [16], CommonCrawl [52], and OpenPhish [36]. The total of extracted lexical, network-based, and content-based features was 40, with the proposed system returning the highest accuracy of 99.08%.…”
Section: ) Lexical and Content-based Features Studiesmentioning
confidence: 99%