URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

被引:44
作者
Afzal, Sara [1 ]
Asim, Muhammad [1 ]
Javed, Abdul Rehman [2 ]
Beg, Mirza Omer [3 ]
Baker, Thar [4 ]
机构
[1] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[2] Air Univ, Dept Cyber Secur, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[4] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
关键词
Malicious URL detection; Security and privacy; Word embedding; Deep neural networks; PREDICTION;
D O I
10.1007/s10922-021-09587-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as weapons for luring susceptible Internet users into executing malicious content leading to compromised systems, scams, and a multitude of cyber-attacks. These attacks can potentially might cause damages ranging from fraud to massive data breaches resulting in huge financial losses. This paper proposes a hybrid deep-learning approach named URLdeepDetect for time-of-click URL analysis and classification to detect malicious URLs. URLdeepDetect analyzes semantic and lexical features of a URL by applying various techniques, including semantic vector models and URL encryption to determine a given URL as either malicious or benign. URLdeepDetect uses supervised and unsupervised mechanisms in the form of LSTM (Long Short-Term Memory) and k-means clustering for URL classification. URLdeepDetect achieves accuracy of 98.3% and 99.7% with LSTM and k-means clustering, respectively.
引用
收藏
页数:27
相关论文
共 47 条
[1]  
Adamic L., 2012, P 21 INT C WORLD WID, P519
[2]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[3]  
[Anonymous], 2014, INT J COMPUT APPL
[4]   DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning [J].
Asad, Muhammad ;
Asim, Muhammad ;
Javed, Talha ;
Beg, Mirza O. ;
Mujtaba, Hasan ;
Abbas, Sohail .
COMPUTER JOURNAL, 2020, 63 (07) :983-994
[5]   A comprehensive survey of AI-enabled phishing attacks detection techniques [J].
Basit, Abdul ;
Zafar, Maham ;
Liu, Xuan ;
Javed, Abdul Rehman ;
Jalil, Zunera ;
Kifayat, Kashif .
TELECOMMUNICATION SYSTEMS, 2021, 76 (01) :139-154
[6]  
Begum A., 2020, ADV DECISION SCI SEC, P587
[7]  
Benevenuto Fabricio., 2010, CEAS
[8]  
Blum A., 2010, P 3 ACM WORKSHOP ART, P54
[9]   Real-time Classification of Malicious URLs on Twitter using Machine Activity Data [J].
Burnap, Pete ;
Javed, Amir ;
Rana, Omer F. ;
Awan, Malik S. .
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, :970-977
[10]  
Cheng Cao, 2015, Advances in Information Retrieval. 37th European Conference on IR Research (ECIR 2015). Proceedings: LNCS 9022, P703, DOI 10.1007/978-3-319-16354-3_77