URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

被引:40
作者
Afzal, Sara [1 ]
Asim, Muhammad [1 ]
Javed, Abdul Rehman [2 ]
Beg, Mirza Omer [3 ]
Baker, Thar [4 ]
机构
[1] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[2] Air Univ, Dept Cyber Secur, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[4] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
关键词
Malicious URL detection; Security and privacy; Word embedding; Deep neural networks; PREDICTION;
D O I
10.1007/s10922-021-09587-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as weapons for luring susceptible Internet users into executing malicious content leading to compromised systems, scams, and a multitude of cyber-attacks. These attacks can potentially might cause damages ranging from fraud to massive data breaches resulting in huge financial losses. This paper proposes a hybrid deep-learning approach named URLdeepDetect for time-of-click URL analysis and classification to detect malicious URLs. URLdeepDetect analyzes semantic and lexical features of a URL by applying various techniques, including semantic vector models and URL encryption to determine a given URL as either malicious or benign. URLdeepDetect uses supervised and unsupervised mechanisms in the form of LSTM (Long Short-Term Memory) and k-means clustering for URL classification. URLdeepDetect achieves accuracy of 98.3% and 99.7% with LSTM and k-means clustering, respectively.
引用
收藏
页数:27
相关论文
共 47 条
  • [1] An intrusion detection system for connected vehicles in smart cities
    Aloqaily, Moayad
    Otoum, Safa
    Al Ridhawi, Ismaeel
    Jararweh, Yaser
    [J]. AD HOC NETWORKS, 2019, 90
  • [2] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    [J]. COMPUTER JOURNAL, 2020, 63 (07) : 983 - 994
  • [3] Bakshy E., 2012, P 21 INT C WORLD WID, P519
  • [4] A comprehensive survey of AI-enabled phishing attacks detection techniques
    Basit, Abdul
    Zafar, Maham
    Liu, Xuan
    Javed, Abdul Rehman
    Jalil, Zunera
    Kifayat, Kashif
    [J]. TELECOMMUNICATION SYSTEMS, 2021, 76 (01) : 139 - 154
  • [5] Begum A., 2020, Advances in Decision Sciences, Image Processing, Security and Computer Vision, V4, P587, DOI 10.1007
  • [6] Benevenuto Fabricio., 2010, CEAS
  • [7] Blum A., 2010, P ACM C COMP COMM SE, P54
  • [8] Real-time Classification of Malicious URLs on Twitter using Machine Activity Data
    Burnap, Pete
    Javed, Amir
    Rana, Omer F.
    Awan, Malik S.
    [J]. PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 970 - 977
  • [9] Cheng Cao, 2015, Advances in Information Retrieval. 37th European Conference on IR Research (ECIR 2015). Proceedings: LNCS 9022, P703, DOI 10.1007/978-3-319-16354-3_77
  • [10] Cova M., 2010, P 19 INT C WORLD WID, P281, DOI 10.1145/1772690.1772720