An intelligent identification and classification system for malicious uniform resource locators (URLs)

被引:22
作者
Abu Al-Haija, Qasem [1 ]
Al-Fayoumi, Mustafa [1 ]
机构
[1] Princess Sumaya Univ Technol PSUT, Dept Cybersecur, Amman, Jordan
关键词
Machine Learning; Uniform resource locators (URLs); Benign URLs; Malware URLs; Spam URLs; Phishing URLs; Defacement URLs; Detection; Classification; PHISHING DETECTION; MACHINE; FEATURES;
D O I
10.1007/s00521-023-08592-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet. Like any Internet service, URLs (also called websites) are vulnerable to compromise by attackers to develop Malicious URLs that can exploit/devastate the user's information and resources. Malicious URLs are usually designed with the intention of promoting cyber-attacks such as spam, phishing, malware, and defacement. These websites usually require action on the user's side and can reach users across emails, text messages, pop-ups, or devious advertisements. They have a potential impact that can reach, in some cases, to compromise the machine or network of the user, especially those arriving by email. Therefore, developing systems to detect malicious URLs is of great interest nowadays. This paper proposes a high-performance machine learning-based detection system to identify Malicious URLs. The proposed system provides two layers of detection. Firstly, we identify the URLs as either benign or malware using a binary classifier. Secondly, we classify the URL classes based on their feature into five classes: benign, spam, phishing, malware, and defacement. Specifically, we report on four ensemble learning approaches, viz. the ensemble of bagging trees (En_Bag) approach, the ensemble of k-nearest neighbor (En_kNN) approach, and the ensemble of boosted decision trees (En_Bos) approach, and the ensemble of subspace discriminator (En_Dsc) approach. The developed approaches have been evaluated on an inclusive and contemporary dataset for uniform resource locators (ISCX-URL2016). ISCX-URL2016 provides a lightweight dataset for detecting and categorizing malicious URLs according to their attack type and lexical analysis. Conventional machine learning evaluation measurements are used to evaluate the detection accuracy, precision, recall, F Score, and detection time. Our experiential assessment indicates that the ensemble of bagging trees (En_Bag) approach provides better performance rates than other ensemble methods. Alternatively, the ensemble of the k-nearest neighbor (En_kNN) approach provides the highest inference speed. We also contrast our En_Bag model with state-of-the-art solutions and show its superiority in binary classification and multi-classification with accuracy rates of 99.3% and 97.92%, respectively.
引用
收藏
页码:16995 / 17011
页数:17
相关论文
共 41 条
[1]   Efficient Email phishing detection using Machine learning [J].
Abdulraheem, Rana ;
Odeh, Ammar ;
Al Fayoumi, Mustafa ;
Keshta, Ismail .
2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, :354-358
[2]  
Abu Al-Haija Qasem, 2021, 2021 International Conference on Data Analytics for Business and Industry (ICDABI), P644, DOI 10.1109/ICDABI53623.2021.9655851
[3]   Detection in Adverse Weather Conditions for Autonomous Vehicles via Deep Learning [J].
Abu Al-Haija, Qasem ;
Gharaibeh, Manaf ;
Odeh, Ammar .
AI, 2022, 3 (02) :303-317
[4]   Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning [J].
Abu Al-Haija, Qasem ;
Al-Saraireh, Ja'afer .
SYMMETRY-BASEL, 2022, 14 (03)
[5]   Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks [J].
Abu Al-Haija, Qasem .
FRONTIERS IN BIG DATA, 2022, 4
[6]   Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning [J].
Abu Al-Haija, Qasem ;
Al-Badawi, Ahmad .
SENSORS, 2022, 22 (01)
[7]   A Real Time Node Connectivity Algorithm for Synchronous Cyber Physical and IoT Network Systems [J].
Abu Al-Haija, Qasem ;
McCurry, Charles D. ;
Zein-Sabatto, Saleh .
IEEE SOUTHEASTCON 2020, 2020,
[8]   Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text [J].
Adebowale, M. A. ;
Lwin, K. T. ;
Sanchez, E. ;
Hossain, M. A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 115 :300-313
[9]   Intelligent Association Classification Technique for Phishing Website Detection [J].
Al-Fayoumi, Mustafa ;
Alwidian, Jaber ;
Abusaif, Mohammad .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) :488-496
[10]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)