Javascript must be enabled to continue!
An Intrinsic Evaluator for Embedding Methods in Malicious URL Detection
View through CrossRef
Abstract
Nowadays, machine learning is used in many fields. Not only in fields such as image recognition, machine learning is also used for malicious detection. Especially in recent years, there have been many studies using machine learning for malicious URL detection to replace traditional blacklists. In order to compare the performance of the malicious URLs detection method, researches used the F-score or other detection accuracy to evaluate, but there are some difficulties in evaluating the URL embedding method used in malicious URLs detection because the detection accuracy is also effect by machine learning or deep learning models and data sets. An evaluation method of URL embedding method that is not affected by other factors is particularly important. In this paper, we proposed an intrinsic evaluation method for URL embedding method that is not affected by machine learning models or deep learning models and data sets. Besides, We analyse some URL embedding methods according to intrinsic and extrinsic methods and offer a guidance in selecting suitable embedding methods in URL by analysing the results.
Title: An Intrinsic Evaluator for Embedding Methods in Malicious URL Detection
Description:
Abstract
Nowadays, machine learning is used in many fields.
Not only in fields such as image recognition, machine learning is also used for malicious detection.
Especially in recent years, there have been many studies using machine learning for malicious URL detection to replace traditional blacklists.
In order to compare the performance of the malicious URLs detection method, researches used the F-score or other detection accuracy to evaluate, but there are some difficulties in evaluating the URL embedding method used in malicious URLs detection because the detection accuracy is also effect by machine learning or deep learning models and data sets.
An evaluation method of URL embedding method that is not affected by other factors is particularly important.
In this paper, we proposed an intrinsic evaluation method for URL embedding method that is not affected by machine learning models or deep learning models and data sets.
Besides, We analyse some URL embedding methods according to intrinsic and extrinsic methods and offer a guidance in selecting suitable embedding methods in URL by analysing the results.
Related Results
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Persistence and half‐life of URL citations cited in LIS open access journals
Persistence and half‐life of URL citations cited in LIS open access journals
PurposeThe main purpose of the present study is to examine the availability and persistence of URL citations in two LIS open access journals. It also intended to calculate the half...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
A Machine Learning Based Three-Step Framework for Malicious URL Detection
A Machine Learning Based Three-Step Framework for Malicious URL Detection
AbstractIn order to solve the shortcomings of using blacklist method to detect malicious URLs, such as slow update speed, the research of using machine learning to detect malicious...
Explainable Ensemble Learning Based Detection of Evasive Malicious PDF Documents
Explainable Ensemble Learning Based Detection of Evasive Malicious PDF Documents
PDF has become a major attack vector for delivering malware and compromising systems and networks, due to its popularity and widespread usage across platforms. PDF provides a flexi...

