Research on malicious domain name detection method based on deep learning

被引:0
作者
Ren, Fei [1 ]
Jiao, Di [1 ]
机构
[1] State Informat Ctr, Beijing 100045, Peoples R China
来源
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024 | 2024年
关键词
malicious domain name detection; Deep learning; BERT model: TextCNN model; Attention mechanism;
D O I
10.1145/3673277.3673292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to address complex network attacks by proposing a malicious domain detection model based on a combination of BERT-TextCNN with attention mechanisms. The BERT model is employed to learn contextual semantics and generate rich semantic representations, while TextCNN contributes local feature extraction capabilities. The integration of global and local attention mechanisms allows targeted focus on key information in URLs, enhancing adaptability to various attack methods. Experimental results across multiple datasets demonstrate the model's outstanding performance in accuracy, precision, recall, and F1-Score, achieving an accuracy rate of 96.67%. In comparison to traditional methods, the proposed model maintains high detection accuracy while exhibiting a broader detection range, providing a reliable deep learning solution for malicious domain detection.
引用
收藏
页码:81 / 85
页数:5
相关论文
共 50 条
[41]   Research on infrared hyperspectral remote sensing cloud detection method based on deep learning [J].
Ni, Zhuoya ;
Wu, Mengdie ;
Lu, Qifeng ;
Huo, Hongyuan ;
Wang, Fu .
INTERNATIONAL JOURNAL OF REMOTE SENSING, 2024, 45 (19-20) :7497-7517
[42]   Research on underwater disease target detection method of inland waterway based on deep learning [J].
Tao Yu ;
Yu Xie ;
Jinsong Luo ;
Wei Zhu ;
Jie Liu .
Scientific Reports, 15 (1)
[43]   A Deep Learning Method Based on the Attention Mechanism for Hardware Trojan Detection [J].
Tang, Wenjing ;
Su, Jing ;
He, Jiaji ;
Gao, Yuchan .
ELECTRONICS, 2022, 11 (15)
[44]   Research on Object Detection and Tracking based on Deep Learning [J].
Pan, Jing .
2024 4TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND INTELLIGENT SYSTEMS ENGINEERING, MLISE 2024, 2024, :236-239
[45]   Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection [J].
Peng, Zuquan ;
He, Yuanyuan ;
Sun, Zhe ;
Ni, Jianbing ;
Niu, Ben ;
Deng, Xianjun .
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, :3118-3123
[46]   Deep learning-based malicious smart contract detection scheme for internet of things environment [J].
Gupta, Rajesh ;
Patel, Mohil Maheshkumar ;
Shukla, Arpit ;
Tanwar, Sudeep .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
[47]   A Novel Prediction Model for Malicious Users Detection and Spectrum Sensing Based on Stacking and Deep Learning [J].
Benazzouza, Salma ;
Ridouani, Mohammed ;
Salahdine, Fatima ;
Hayar, Aawatif .
SENSORS, 2022, 22 (17)
[48]   MMWD: An efficient mobile malicious webpage detection framework based on deep learning and edge cloud [J].
Liu, Yizhi ;
Zhu, Chaoqun ;
Wu, Yadi ;
Xu, Heng ;
Song, Jun .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18)
[49]   Research on Deep Learning-based Detection of Changes in Diabetic Retinopathy Lesions [J].
Pan, Anning ;
Yang, Jingzong ;
Shi, Chunchao .
PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, :1702-1707
[50]   Research on UWB positioning method based on deep learning [J].
Ye, Xiaotong ;
Zhang, Yu .
2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, :1505-1508