URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

被引:40
作者
Afzal, Sara [1 ]
Asim, Muhammad [1 ]
Javed, Abdul Rehman [2 ]
Beg, Mirza Omer [3 ]
Baker, Thar [4 ]
机构
[1] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[2] Air Univ, Dept Cyber Secur, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Islamabad 44000, Pakistan
[4] Univ Sharjah, Dept Comp Sci, Sharjah 27272, U Arab Emirates
关键词
Malicious URL detection; Security and privacy; Word embedding; Deep neural networks; PREDICTION;
D O I
10.1007/s10922-021-09587-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as weapons for luring susceptible Internet users into executing malicious content leading to compromised systems, scams, and a multitude of cyber-attacks. These attacks can potentially might cause damages ranging from fraud to massive data breaches resulting in huge financial losses. This paper proposes a hybrid deep-learning approach named URLdeepDetect for time-of-click URL analysis and classification to detect malicious URLs. URLdeepDetect analyzes semantic and lexical features of a URL by applying various techniques, including semantic vector models and URL encryption to determine a given URL as either malicious or benign. URLdeepDetect uses supervised and unsupervised mechanisms in the form of LSTM (Long Short-Term Memory) and k-means clustering for URL classification. URLdeepDetect achieves accuracy of 98.3% and 99.7% with LSTM and k-means clustering, respectively.
引用
收藏
页数:27
相关论文
共 47 条
  • [11] De Wang, 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), P250, DOI 10.4108/icst.collaboratecom.2013.254084
  • [12] Flow-Based Web Application Brute-Force Attack and Compromise Detection
    Hofstede, Rick
    Jonker, Mattijs
    Sperotto, Anna
    Pras, Aiko
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2017, 25 (04) : 735 - 758
  • [13] Imtiaz S.I., 2020, FUTURE GENER COMP SY
  • [14] Online Tor Privacy Breach Through Website Fingerprinting Attack
    Jahani, Hojjat
    Jalili, Saeed
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2019, 27 (02) : 289 - 326
  • [15] Word2vec convolutional neural networks for classification of news articles and tweets
    Jang, Beakcheol
    Kim, Inhwan
    Kim, Jong Wook
    [J]. PLOS ONE, 2019, 14 (08):
  • [16] Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network
    Javed, Abdul Rehman
    Usman, Muhammad
    Rehman, Saif Ur
    Khan, Mohib Ullah
    Haghighi, Mohammad Sayad
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) : 4291 - 4300
  • [17] Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles
    Javed, Abdul Rehman
    Jalil, Zunera
    Moqurrab, Syed Atif
    Abbas, Sidra
    Liu, Xuan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
  • [18] Javed AR, 2020, J AMB INTEL HUM COMP, DOI [10.1007/s10723-019-09498-8, 10.1007/s12652-020-01770-0]
  • [19] Prediction of drive-by download attacks on Twitter
    Javed, Amir
    Burnap, Pete
    Rana, Omer
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 1133 - 1145
  • [20] Detecting network attacks in the Internet via statistical network traffic normality prediction
    Jiang J.
    Papavassiliou S.
    [J]. Journal of Network and Systems Management, 2004, 12 (1) : 51 - 72