Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions

被引:29
作者
Aljabri, Malak [1 ,2 ]
Altamimi, Hanan S. [2 ]
Albelali, Shahd A. [2 ]
Al-Harbi, Maimunah [2 ]
Alhuraib, Haya T. [2 ]
Alotaibi, Najd K. [2 ]
Alahmadi, Amal A. [3 ]
Alhaidari, Fahd [3 ]
Mohammad, Rami Mustafa A. [4 ]
Salah, Khaled [5 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 21955, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Sci, Dammam 31441, Saudi Arabia
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Networks & Commun, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Informat Syst, Dammam 31441, Saudi Arabia
[5] Khalifa Univ Sci & Technol, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
关键词
Phishing; URL; machine learning; cybersecurity; random forest; malicious; PHISHING DETECTION; FEATURES;
D O I
10.1109/ACCESS.2022.3222307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the digital world has advanced significantly, particularly on the Internet, which is critical given that many of our activities are now conducted online. As a result of attackers' inventive techniques, the risk of a cyberattack is rising rapidly. One of the most critical attacks is the malicious URL intended to extract unsolicited information by mainly tricking inexperienced end users, resulting in compromising the user's system and causing losses of billions of dollars each year. As a result, securing websites is becoming more critical. In this paper, we provide an extensive literature review highlighting the main techniques used to detect malicious URLs that are based on machine learning models, taking into consideration the limitations in the literature, detection technologies, feature types, and the datasets used. Moreover, due to the lack of studies related to malicious Arabic website detection, we highlight the directions of studies in this context. Finally, as a result of the analysis, we conducted on the selected studies, we present challenges that might degrade the quality of malicious URL detectors, along with possible solutions.
引用
收藏
页码:121395 / 121417
页数:23
相关论文
共 172 条
[51]  
[Anonymous], ALEXA INT DON ARCH W
[52]  
[Anonymous], CO HIST
[53]  
[Anonymous], US
[54]  
[Anonymous], REASONABLE ANTIPHISH
[55]  
[Anonymous], About Us
[56]  
[Anonymous], PHISH SIT URLS
[57]  
[Anonymous], LIST RESTRICTED WEBS
[58]  
[Anonymous], GITHUB KERAS TEAM KE
[59]  
[Anonymous], EMPIRICAL ANAL PHISH
[60]  
[Anonymous], URL 2016 DAT RES