Identifying Generic Features for Malicious URL Detection System

被引:0
|
作者
Khan, Hafiz Mohammd Junaid [1 ]
Niyaz, Quamar [1 ]
Devabhaktuni, Vijay K. [1 ]
Guo, Site [2 ]
Shaikh, Umair [3 ]
机构
[1] Purdue Univ Northwest, Coll Engn & Sci, ECE Dept, Hammond, IN 46323 USA
[2] BeulahWorks, Valparaiso, IN 46385 USA
[3] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
computer security; malicious URL detection; machine learning; features analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious URLs pose serious cybersecurity threats to the Internet users. It is critical to detect malicious URLs so that they could be blocked from user access. Several techniques have been proposed to differentiate malicious URLs from benign ones. However, the goal of our work is to find the list of substantial features that can be used to classify most of the malicious URLs. In this paper, we select the most significant lexical features from different datasets using Chi-Square and ANOVA F-value. Later, we apply a voting classifier that combines several machine learning algorithms on those selected features.
引用
收藏
页码:347 / 352
页数:6
相关论文
共 50 条
  • [31] Malicious URL Detection Algorithm based on BM Pattern Matching
    Yu, Fuqiang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 33 - 44
  • [32] A Malicious Advertising Detection Scheme Based on the Depth of URL Strategy
    Zhang, Tiliang
    Zhang, Hua
    Gao, Fei
    [J]. 2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 57 - 60
  • [33] Malicious url detection using machine learning and ensemble modeling
    Pakhare P.S.
    Krishnan S.
    Charniya N.N.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 839 - 850
  • [34] Efficient segment pattern based method for malicious URL detection
    Lin, Hai-Lun
    Li, Yan
    Wang, Wei-Ping
    Yue, Yin-Liang
    Lin, Zheng
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36
  • [35] Identifying Generic Features of KDD Cup 1999 for Intrusion Detection
    Jebur, Hamid H.
    Maarof, Mohd Aizaini
    Zainal, Anazida
    [J]. JURNAL TEKNOLOGI, 2015, 74 (01):
  • [36] Toward identifying malicious encrypted traffic with a causality detection system
    Zeng, Zengri
    Xun, Peng
    Peng, Wei
    Zhao, Baokang
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [37] MALICIOUS URL DETECTION USING MULTI-LAYER FILTERING MODEL
    Kumar, Rajesh
    Zhang, Xiaosong
    Tariq, Hussain Ahmad
    Khan, Riaz Ullah
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 97 - 100
  • [38] Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection
    Khramtsova, Ekaterina
    Hammerschmidt, Christian
    Lagraa, Sofian
    State, Radu
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1316 - 1321
  • [39] Launching Adversarial Label Contamination Attacks Against Malicious URL Detection
    Marchand, Bruno
    Pitropakis, Nikolaos
    Buchanan, William J.
    Lambrinoudakis, Costas
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 69 - 82
  • [40] IoT-Enhanced Malicious URL Detection Using Machine Learning
    Weshahi, Aysar
    Dwaik, Feras
    Khouli, Mohammad
    Ashqar, Huthaifa I.
    Shatnawi, Amani
    ElKhodr, Mahmoud
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 5, AINA 2024, 2024, 203 : 470 - 482