Building a Multi-class Prediction App for Malicious URLs

被引:0
作者
Sundaram, Vijayaraj [1 ]
Abhi, Shinu [1 ]
Agarwal, Rashmi [1 ]
机构
[1] REVA Univ, REVA Acad Corp Excellence, Bangalore, Karnataka, India
来源
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT II | 2023年 / 1798卷
关键词
Multiclass classification; Malicious URLs; Ensemble learning; Nonparametric models; Prediction;
D O I
10.1007/978-3-031-28183-9_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The page that houses a malicious snippet that could misuse a user's computing resources, steal confidential data, or carry out other forms of assaults is known as a malicious host URL. They are generally distributed across the world wide web under various usage categories like spam, malware, phishing, etc. Although numerous methods or fixes (to identify URLs) have been developed in recent years, still cyberattacks continue to occur. This study contributes towards implementing three tiers of the system for detection and protection from harmful URLs. The first tier focuses on evaluating the performance of discriminative features in model creation. Discriminative features are derived fromURL details and "Whois" webpage information that helps in improving detection performance with less latency and low computational complexity. The influence of feature variation on Parametric (neural network) and non-parametric classifier detection results are assessed to narrow down to the most prominent features to be adapted in the best model for the task of identifying URLs with multi-categorization. The study reveals that non-parametric ensemble models like Light GBM, XGBoost, and Random Forest performed well with a detection accuracy of over 95%, which facilitated building a real-time detection system and differentiating multiple attack types (such as Malware, Phishing, and spam). The second tier focuses on validationwith a global database to know, if entered URL is reported as suspicious by various detection engines already. If not, it enables the user in updating the global database with URL details that are new and not reported yet. Finally, the two modules are integrated to create a web application using Streamlit that provides full system protection against malicious URLs.
引用
收藏
页码:455 / 475
页数:21
相关论文
共 27 条
[11]  
Hevapathige Asela, 2022, 2022 2nd International Conference on Advanced Research in Computing (ICARC), P114, DOI 10.1109/ICARC54489.2022.9753802
[12]  
Hong Zhao, 2022, 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), P11, DOI 10.1109/CSCWD54268.2022.9776264
[13]  
Lakshmanarao A., 2021, 2021 INT C INN COMP, P1, DOI DOI 10.1109/ICSES52305.2021.9633889
[14]   Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods [J].
Li, Tie ;
Kou, Gang ;
Peng, Yi .
INFORMATION SYSTEMS, 2020, 91
[15]  
Public C, 2021, CYBER SECURITY THREA
[16]   A recent review of conventional vs. automated cybersecurity anti-phishing techniques [J].
Qabajeh, Issa ;
Thabtah, Fadi ;
Chiclana, Francisco .
COMPUTER SCIENCE REVIEW, 2018, 29 :44-55
[17]  
Ramesh K., 2021, Proceedings of 5th International Conference on Computing Methodologies and Communication (ICCMC 2021), P1188, DOI 10.1109/ICCMC51019.2021.9418480
[18]   Detecting Malicious URLs in E-Mail - An Implementation [J].
Ranganayakulu, Dhanalakshmi ;
Chellappan, C. .
2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL, 2013, 4 :125-131
[19]   PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach [J].
Rao, Routhu Srinivasa ;
Ali, Syed Taqi .
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 :147-156
[20]  
Rosenthal M, 2022, MUST KNOW PHISHING S