Building a Multi-class Prediction App for Malicious URLs

被引:0
作者
Sundaram, Vijayaraj [1 ]
Abhi, Shinu [1 ]
Agarwal, Rashmi [1 ]
机构
[1] REVA Univ, REVA Acad Corp Excellence, Bangalore, Karnataka, India
来源
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT II | 2023年 / 1798卷
关键词
Multiclass classification; Malicious URLs; Ensemble learning; Nonparametric models; Prediction;
D O I
10.1007/978-3-031-28183-9_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The page that houses a malicious snippet that could misuse a user's computing resources, steal confidential data, or carry out other forms of assaults is known as a malicious host URL. They are generally distributed across the world wide web under various usage categories like spam, malware, phishing, etc. Although numerous methods or fixes (to identify URLs) have been developed in recent years, still cyberattacks continue to occur. This study contributes towards implementing three tiers of the system for detection and protection from harmful URLs. The first tier focuses on evaluating the performance of discriminative features in model creation. Discriminative features are derived fromURL details and "Whois" webpage information that helps in improving detection performance with less latency and low computational complexity. The influence of feature variation on Parametric (neural network) and non-parametric classifier detection results are assessed to narrow down to the most prominent features to be adapted in the best model for the task of identifying URLs with multi-categorization. The study reveals that non-parametric ensemble models like Light GBM, XGBoost, and Random Forest performed well with a detection accuracy of over 95%, which facilitated building a real-time detection system and differentiating multiple attack types (such as Malware, Phishing, and spam). The second tier focuses on validationwith a global database to know, if entered URL is reported as suspicious by various detection engines already. If not, it enables the user in updating the global database with URL details that are new and not reported yet. Finally, the two modules are integrated to create a web application using Streamlit that provides full system protection against malicious URLs.
引用
收藏
页码:455 / 475
页数:21
相关论文
共 27 条
[1]  
Acharya J., 2021, P 2021 2 INT C EMERG, P1, DOI [10.1109/INCET51464.2021.9456440, DOI 10.1109/INCET51464.2021.9456440]
[2]  
Alazab M., MALICIOUS URL DETECT
[3]  
Alsmadi Tibra, 2021, 2021 International Conference on Information Technology (ICIT), P371, DOI 10.1109/ICIT52682.2021.9491765
[4]  
[Anonymous], 2011, Proceedings of the 2Nd USENIX Conference on Web Application Development, WebApps'11
[5]  
Anti-Phishing Working Group and Institute of Electrical and Electronics Engineers, CLASS PHISH URLS US
[6]   Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation [J].
Bharadwaj, Rohit ;
Bhatia, Ashutosh ;
Chhibbar, Laxmi Divya ;
Tiwari, Kamlesh ;
Agrawal, Ankit .
36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, :486-491
[7]   A Malicious URL Detection Method Based on CNN [J].
Chen, Yu ;
Zhou, Yajian ;
Dong, Qingqing ;
Li, Qi .
2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, :23-28
[8]   Malicious URL Detection using Logistic Regression [J].
Chiramdasu, Rupa ;
Srivastava, Gautam ;
Bhattacharya, Sweta ;
Reddy, Praveen Kumar ;
Gadekallu, Thippa Reddy .
2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, :33-38
[9]  
George R., 2019, P INT C TRENDS ELECT, P357, DOI [10.1109/ICOEI.2019.8862664, DOI 10.1109/ICOEI.2019.8862664]
[10]   Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning [J].
Ghaleb, Fuad A. ;
Alsaedi, Mohammed ;
Saeed, Faisal ;
Ahmad, Jawad ;
Alasli, Mohammed .
SENSORS, 2022, 22 (09)