Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection

被引:2
|
作者
Peng, Zuquan [1 ]
He, Yuanyuan [1 ]
Sun, Zhe [2 ]
Ni, Jianbing [3 ]
Niu, Ben [4 ]
Deng, Xianjun [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious URL; adversarial examples; deep learning; adversarial training;
D O I
10.1109/ICC45855.2022.9838536
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Detecting malicious URLs is of great significance to reduce cyber crimes and maintain Internet security. Currently, Deep Learning (DL) techniques have been widely used to improve the classical malicious URL detection models, as DL-based detection models can perform an in-depth analysis of the text information of the URL, and detect the fishing URLs of unknown cyber attack types with high accuracy. Any missed blocking of malicious URLs can potentially result in a huge loss of information and property. In this paper, we focus on the vulnerability of the existing DL-based malicious URL detection models and show that they are sensitive to adversarial samples. First, we construct URL adversarial samples based on the component-level and character-level perturbations and use them to attack mainstream DL-based detection models, resulting in obvious decreases in the detection accuracies. Meanwhile, the perturbations are under the constraints that each adversarial sample URL is hardly distinguished from the original URL with naked eyes. Furthermore, under most circumstances, the adversarial samples constructed by replacing 14 types of characters and perturbing other all components except the scheme component lead to the largest increased number of missed blocking of malicious URLs, i.e., a bigger drop in the accuracy than other constructed methods. Finally, extensive experiments demonstrate the effectiveness of our adversarial examples. Even if the adversarial training is used against our adversarial samples, the adversarial samples still work and bring oblivious decreases in their accuracy.
引用
收藏
页码:3118 / 3123
页数:6
相关论文
共 50 条
  • [21] Launching Adversarial Label Contamination Attacks Against Malicious URL Detection
    Marchand, Bruno
    Pitropakis, Nikolaos
    Buchanan, William J.
    Lambrinoudakis, Costas
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 69 - 82
  • [22] Deep-Learning-Based Complex Scene Text Detection Algorithm for Architectural Images
    Sun, Weiwei
    Wang, Huiqian
    Lu, Yi
    Luo, Jiasai
    Liu, Ting
    Lin, Jinzhao
    Pang, Yu
    Zhang, Guo
    [J]. MATHEMATICS, 2022, 10 (20)
  • [23] MHDT: A Deep-Learning-Based Text Detection Algorithm for Unstructured Data in Banking
    Ma, Shenglan
    Yang, Lingling
    Wang, Hao
    Xiao, Hong
    Dai, Hong-Ning
    Cheng, Shuhan
    Wang, Tongsen
    [J]. ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, : 295 - 300
  • [24] Multiuser Adversarial Attack on Deep Learning for OFDM Detection
    Ye, Youjie
    Chen, Yunfei
    Liu, Mingqian
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (12) : 2527 - 2531
  • [25] Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems
    Yang, Kaichen
    Liu, Jianqing
    Zhang, Chi
    Fang, Yuguang
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 559 - 564
  • [26] Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model
    Aljebreen, Mohammed
    Alrayes, Fatma S.
    Aljameel, Sumayh S.
    Saeed, Muhammad Kashif
    [J]. SUSTAINABILITY, 2023, 15 (24)
  • [27] deepBF: Malicious URL detection using learned Bloom Filter and evolutionary deep learning
    Patgiri, Ripon
    Biswas, Anupam
    Nayak, Sabuzima
    [J]. COMPUTER COMMUNICATIONS, 2023, 200 : 30 - 41
  • [28] Malicious URL Prediction based on Community Detection
    Zheng Li-xiong
    Xu Xiao-lin
    Li Jia
    Zhang Lu
    Pan Xuan-chen
    Ma Zhi-yuan
    Zhang Li-hong
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [29] Privacy Preserving Machine Learning for Malicious URL Detection
    Shaik, Imtiyazuddin
    Emmadi, Nitesh
    Tupsamudre, Harshal
    Narumanchi, Harika
    Bhattachar, Rajan Mindigal Alasingara
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2021 WORKSHOPS, 2021, 1479 : 31 - 41
  • [30] Malicious URL and Intrusion Detection using Machine Learning
    Hamza, Amr
    Hammam, Farah
    Abouzeid, Medhat
    Ahmed, Mohammad Arsalan
    Dhou, Salam
    Aloul, Fadi
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 795 - 800