2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International 2019
DOI: 10.1109/trustcom/bigdatase.2019.00024
|View full text |Cite
|
Sign up to set email alerts
|

Phishing URL Detection via CNN and Attention-Based Hierarchical RNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
49
0
2

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(52 citation statements)
references
References 19 publications
1
49
0
2
Order By: Relevance
“…In [35]'s method, through using the Bi-IndRNN model to learn the host features and URL information features, and finally a recall rate of 99.93% is obtained. The proposed model [36] is somewhat similar to our model, and its performance was similar to that of Bi-LSTM. It is observed that our model has some improvements over the previous model, moreover, the results in the table are also encouraging, with an accuracy rate of 99.78%.…”
Section: F Comparison With Methodssupporting
confidence: 56%
“…In [35]'s method, through using the Bi-IndRNN model to learn the host features and URL information features, and finally a recall rate of 99.93% is obtained. The proposed model [36] is somewhat similar to our model, and its performance was similar to that of Bi-LSTM. It is observed that our model has some improvements over the previous model, moreover, the results in the table are also encouraging, with an accuracy rate of 99.78%.…”
Section: F Comparison With Methodssupporting
confidence: 56%
“…Da mesma forma, [Huang et al 2019] também ofereceram soluções para phishing, mas, diferente dos autores anteriores, o foco de pesquisa foram páginas web e não e-mail. A proposta dos autores foi um método, denominado PhishingNet, baseado em DL para detecção de URL de phishing, que consiste em um módulo CNN e um módulo RNN baseado em atenção hierárquica.…”
Section: Trabalhos Realizadosunclassified
“…A análise de metadados, ainda que em ameças diferentes,é apresentada nos trabalhos de [Shrestha et al 2015], [Fang et al 2019], [Huang et al 2019] e [Zhang et al 2019], condição que apoia a estratégia de uso dos mesmos algoritmos de DL, no caso, LSTM, MLP, CNN, DBN, SVM e RNN. Além da técnica de autoencoder apresentada por [Liu et al 2019].…”
Section: Framework Para Detecção De Exfiltração Em Hdfs Baseado Em Dlpsunclassified
“…In this method, character-level and word level features are extracted based on URL strings and CNN network is used for training and testing. Huang et al [29] proposed the PhishingNet deep learning-based method for detection of phishing URLs. They use a CNN network to extract character-level features of URLs; meanwhile, they employ an attention-based hierarchical recurrent neural network (RNN) to extract word-level features of URLs.…”
Section: Deep Learning-based Detectionmentioning
confidence: 99%