Intelligent System to Detect Malicious URLs Using Machine-Learning Algorithms

被引:0
作者
Jeyavadhanam, B. Rebecca [1 ]
Bhuvanan, Mahesh [1 ]
Sihan, Haroon [1 ]
Ahmadzadeh, Sahar [1 ]
Karthick, Gayathri [1 ]
机构
[1] York St John Univ, Dept Comp Sci, London, England
来源
PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, ICICT 2024 | 2024年 / 1012卷
关键词
Malicious; Machine learning; URL; Decision tree; Logistic;
D O I
10.1007/978-981-97-3556-3_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital technology has made significant advancements in recent years, particularly on the Internet. Since most of our activities are now conducted online, this development is of particular significance. The continuous evolution of cyber threats has led to a heightened risk of cyberattacks, driven by the inventive tactics employed by malicious actors. Among these threats, one of the most perilous is the malicious URL, meticulously crafted to illicitly obtain information from unsuspecting novice end users. Such attacks compromise user systems and incur annual financial losses in the billions of dollars. Consequently, there is a growing imperative to fortify website defenses. The principal objective of this study is to develop a machine-learning model capable of discerning between malicious and legitimate URLs based on carefully selected parameters for each category. This research employs a variety of machine learning techniques, including decision tree (DT), logistic regression (LR), multi-layer perceptron (MLP), and naive Bayes (NB), while exploring different hyperparameter configurations to classify URLs as safe or malicious. Upon analyzing the experimental results, it is evident that the 'tanh' activation function of MLP in conjunction with the 'adam' solver achieves the highest accuracy rate of 80.01%. This underscores the effectiveness of our approach in enhancing cybersecurity measures against malicious URLs.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 10 条
[1]   URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models [J].
Afzal, Sara ;
Asim, Muhammad ;
Javed, Abdul Rehman ;
Beg, Mirza Omer ;
Baker, Thar .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (03)
[2]   The Adverse Effects of Code Duplication in Machine Learning Models of Code [J].
Allamams, Miltiadis .
PROCEEDINGS OF THE 2019 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON NEW IDEAS, NEW PARADIGMS, AND REFLECTIONS ON PROGRAMMING AND SOFTWARE (ONWARD!' 19), 2019, :143-153
[3]   The entropy of Hawking radiation [J].
Almheiri, Ahmed ;
Hartman, Thomas ;
Maldacena, Juan ;
Shaghoulian, Edgar ;
Tajdini, Amirhossein .
REVIEWS OF MODERN PHYSICS, 2021, 93 (03)
[4]   Bispectrum Features and Multilayer Perceptron Classifier to Enhance Seizure Prediction [J].
Assi, Elie Bou ;
Gagliano, Laura ;
Rihana, Sandy ;
Nguyen, Dang K. ;
Sawan, Mohamad .
SCIENTIFIC REPORTS, 2018, 8
[5]  
Baojiang Cui, 2018, International Journal of High Performance Computing and Networking, V12, P166
[6]   Extracting Value from Industrial Alarms and Events: A Data-Driven Approach Based on Exploratory Data Analysis [J].
Bezerra, Aguinaldo ;
Silva, Ivanovitch ;
Guedes, Luiz Affonso ;
Silva, Diego ;
Leitao, Gustavo ;
Saito, Kaku .
SENSORS, 2019, 19 (12)
[7]  
Catak F., 2021, Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, P160
[8]  
Charbuty B., 2021, Journal of Applied Science and Technology Trends, V2, P01, DOI [10.38094/jastt20165, DOI 10.38094/JASTT20165]
[9]   A review of microscopic analysis of blood cells for disease detection with AI perspective [J].
Deshpande, Nilkanth Mukund ;
Gite, Shilpa ;
Aluvalu, Rajanikanth .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-27
[10]   Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning [J].
Ghaleb, Fuad A. ;
Alsaedi, Mohammed ;
Saeed, Faisal ;
Ahmad, Jawad ;
Alasli, Mohammed .
SENSORS, 2022, 22 (09)