Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Machine Learning Based Three-Step Framework for Malicious URL Detection

View through CrossRef
AbstractIn order to solve the shortcomings of using blacklist method to detect malicious URLs, such as slow update speed, the research of using machine learning to detect malicious URLs increasing. These research have proposed their own methods and obtained great accuracy, but the summary research on malicious URLs detection is insufficient. In this paper, we propose a three-step framework for malicious URLs detection, and we overview 14 related works by our three-step framework and find that almost all research on malicious URLs detection using machine learning can be classified by the three-step framework. We evaluate some machine learning models and context-considering methods and their suitability by our three-step framework. According to the results, we verify the importance of considering context and find that context-considering embedding methods are more important and the malicious URLs detection accuracy improved with context-considering methods.
Springer Science and Business Media LLC
Title: A Machine Learning Based Three-Step Framework for Malicious URL Detection
Description:
AbstractIn order to solve the shortcomings of using blacklist method to detect malicious URLs, such as slow update speed, the research of using machine learning to detect malicious URLs increasing.
These research have proposed their own methods and obtained great accuracy, but the summary research on malicious URLs detection is insufficient.
In this paper, we propose a three-step framework for malicious URLs detection, and we overview 14 related works by our three-step framework and find that almost all research on malicious URLs detection using machine learning can be classified by the three-step framework.
We evaluate some machine learning models and context-considering methods and their suitability by our three-step framework.
According to the results, we verify the importance of considering context and find that context-considering embedding methods are more important and the malicious URLs detection accuracy improved with context-considering methods.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
An Intrinsic Evaluator for Embedding Methods in Malicious URL Detection
An Intrinsic Evaluator for Embedding Methods in Malicious URL Detection
Abstract Nowadays, machine learning is used in many fields. Not only in fields such as image recognition, machine learning is also used for malicious detection. Especially ...
Persistence and half‐life of URL citations cited in LIS open access journals
Persistence and half‐life of URL citations cited in LIS open access journals
PurposeThe main purpose of the present study is to examine the availability and persistence of URL citations in two LIS open access journals. It also intended to calculate the half...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
Explainable Ensemble Learning Based Detection of Evasive Malicious PDF Documents
Explainable Ensemble Learning Based Detection of Evasive Malicious PDF Documents
PDF has become a major attack vector for delivering malware and compromising systems and networks, due to its popularity and widespread usage across platforms. PDF provides a flexi...

Back to Top