URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

被引:44
作者
Afzal, Sara [1 ]
Asim, Muhammad [1 ]
Javed, Abdul Rehman [2 ]
Beg, Mirza Omer [3 ]
Baker, Thar [4 ]
机构
[1] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[2] Air Univ, Dept Cyber Secur, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[4] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
关键词
Malicious URL detection; Security and privacy; Word embedding; Deep neural networks; PREDICTION;
D O I
10.1007/s10922-021-09587-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as weapons for luring susceptible Internet users into executing malicious content leading to compromised systems, scams, and a multitude of cyber-attacks. These attacks can potentially might cause damages ranging from fraud to massive data breaches resulting in huge financial losses. This paper proposes a hybrid deep-learning approach named URLdeepDetect for time-of-click URL analysis and classification to detect malicious URLs. URLdeepDetect analyzes semantic and lexical features of a URL by applying various techniques, including semantic vector models and URL encryption to determine a given URL as either malicious or benign. URLdeepDetect uses supervised and unsupervised mechanisms in the form of LSTM (Long Short-Term Memory) and k-means clustering for URL classification. URLdeepDetect achieves accuracy of 98.3% and 99.7% with LSTM and k-means clustering, respectively.
引用
收藏
页数:27
相关论文
共 47 条
[11]  
Cova M., 2010, Proceedings of the 19th International Conference on World Wide Web. WWW'10, P281, DOI DOI 10.1145/1772690.1772720
[12]  
De Wang, 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), P250, DOI 10.4108/icst.collaboratecom.2013.254084
[13]   Flow-Based Web Application Brute-Force Attack and Compromise Detection [J].
Hofstede, Rick ;
Jonker, Mattijs ;
Sperotto, Anna ;
Pras, Aiko .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2017, 25 (04) :735-758
[14]  
Imtiaz S.I., 2020, FUTURE GENER COMP SY
[15]   Online Tor Privacy Breach Through Website Fingerprinting Attack [J].
Jahani, Hojjat ;
Jalili, Saeed .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2019, 27 (02) :289-326
[16]   Word2vec convolutional neural networks for classification of news articles and tweets [J].
Jang, Beakcheol ;
Kim, Inhwan ;
Kim, Jong Wook .
PLOS ONE, 2019, 14 (08)
[17]   Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network [J].
Javed, Abdul Rehman ;
Usman, Muhammad ;
Rehman, Saif Ur ;
Khan, Mohib Ullah ;
Haghighi, Mohammad Sayad .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :4291-4300
[18]   Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles [J].
Javed, Abdul Rehman ;
Jalil, Zunera ;
Moqurrab, Syed Atif ;
Abbas, Sidra ;
Liu, Xuan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
[19]  
Javed AR, 2020, J AMB INTEL HUM COMP, DOI [10.1007/s12652-020-01770-0, 10.1007/s10723-019-09498-8]
[20]   Prediction of drive-by download attacks on Twitter [J].
Javed, Amir ;
Burnap, Pete ;
Rana, Omer .
INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) :1133-1145