{"title":"An intelligent identification and classification system for malicious uniform resource locators (URLs).","authors":"Qasem Abu Al-Haija, Mustafa Al-Fayoumi","doi":"10.1007/s00521-023-08592-z","DOIUrl":"10.1007/s00521-023-08592-z","url":null,"abstract":"<p><p>Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet. Like any Internet service, URLs (also called websites) are vulnerable to compromise by attackers to develop Malicious URLs that can exploit/devastate the user's information and resources. Malicious URLs are usually designed with the intention of promoting cyber-attacks such as spam, phishing, malware, and defacement. These websites usually require action on the user's side and can reach users across emails, text messages, pop-ups, or devious advertisements. They have a potential impact that can reach, in some cases, to compromise the machine or network of the user, especially those arriving by email. Therefore, developing systems to detect malicious URLs is of great interest nowadays. This paper proposes a high-performance machine learning-based detection system to identify Malicious URLs. The proposed system provides two layers of detection. Firstly, we identify the URLs as either benign or malware using a binary classifier. Secondly, we classify the URL classes based on their feature into five classes: benign, spam, phishing, malware, and defacement. Specifically, we report on four ensemble learning approaches, viz. the ensemble of bagging trees (En_Bag) approach, the ensemble of k-nearest neighbor (En_kNN) approach, and the ensemble of boosted decision trees (En_Bos) approach, and the ensemble of subspace discriminator (En_Dsc) approach. The developed approaches have been evaluated on an inclusive and contemporary dataset for uniform resource locators (ISCX-URL2016). ISCX-URL2016 provides a lightweight dataset for detecting and categorizing malicious URLs according to their attack type and lexical analysis. Conventional machine learning evaluation measurements are used to evaluate the detection accuracy, precision, recall, F Score, and detection time. Our experiential assessment indicates that the ensemble of bagging trees (En_Bag) approach provides better performance rates than other ensemble methods. Alternatively, the ensemble of the k-nearest neighbor (En_kNN) approach provides the highest inference speed. We also contrast our En_Bag model with state-of-the-art solutions and show its superiority in binary classification and multi-classification with accuracy rates of 99.3% and 97.92%, respectively.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-17"},"PeriodicalIF":6.0,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10117275/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9771495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MVDroid: an android malicious VPN detector using neural networks.","authors":"Saeed Seraj, Siavash Khodambashi, Michalis Pavlidis, Nikolaos Polatidis","doi":"10.1007/s00521-023-08512-1","DOIUrl":"10.1007/s00521-023-08512-1","url":null,"abstract":"<p><p>The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs are not secure to use. When examined closely, VPNs can appear to be perfect on the surface but still be a complete privacy and security disaster. Some VPNs will steal our bandwidth, infect our computers with malware, install secret tracking libraries on our devices, steal our personal data, and leave our data exposed to third parties. Generally, Android users should be cautious when installing any VPN software on their devices. As a result, it is important to identify malicious VPNs before downloading and installing them on our Android devices. This paper provides an optimised deep learning neural network for identifying fake VPNs, and VPNs infected by malware based on the permissions of the apps, as well as a novel dataset of malicious and benign Android VPNs. Experimental results indicate that our proposed classifier identifies malicious VPNs with high accuracy, while it outperforms other standard classifiers in terms of evaluation metrics such as accuracy, precision, and recall.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-11"},"PeriodicalIF":4.5,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10069720/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9688573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning based multipurpose medical image watermarking.","authors":"Rishi Sinhal, Irshad Ahmad Ansari","doi":"10.1007/s00521-023-08457-5","DOIUrl":"10.1007/s00521-023-08457-5","url":null,"abstract":"<p><p>Digital data security has become an exigent area of research due to a huge amount of data availability at present time. Some of the fields like medical imaging and medical data sharing over communication platforms require high security against counterfeit access, manipulation and other processing operations. It is essential because the changed/manipulated data may lead to erroneous judgment by medical experts and can negatively influence the human's heath. This work offers a blind and robust medical image watermarking framework using deep neural network to provide effective security solutions for medical images. During watermarking, the region of interest (ROI) data of the original image is preserved by employing the LZW (Lampel-Ziv-Welch) compression algorithm. Subsequently the robust watermark is inserted into the original image using IWT (integer wavelet transform) based embedding approach. Next, the SHA-256 algorithm-based hash keys are generated for ROI and RONI (region of non-interest) regions. The fragile watermark is then prepared by ROI recovery data and the hash keys. Further, the LSB replacement-based insertion mechanism is utilized to embed the fragile watermark into RONI embedding region of robust watermarked image. A deep neural network-based framework is used to perform robust watermark extraction for efficient results with less computational time. Simulation results verify that the scheme has significant imperceptibility, efficient robust watermark extraction, correct authentication and completely reversible nature for ROI recovery. The relative investigation with existing schemes confirms the dominance of the proposed work over already existing work.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-22"},"PeriodicalIF":6.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10036986/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9717268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of three quantum-inspired optimization algorithms for robust tuning of power system stabilizers","authors":"R. N. D. C. Filho","doi":"10.1007/s00521-023-08429-9","DOIUrl":"https://doi.org/10.1007/s00521-023-08429-9","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"5 1","pages":"12905-12914"},"PeriodicalIF":6.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73375534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new robust Harris Hawk optimization algorithm for large quadratic assignment problems","authors":"Tansel Dökeroglu, Y. Özdemir","doi":"10.1007/s00521-023-08387-2","DOIUrl":"https://doi.org/10.1007/s00521-023-08387-2","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"86 1","pages":"12531-12544"},"PeriodicalIF":6.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81271821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time automated detection of older adults' hand gestures in home and clinical settings.","authors":"Guan Huang, Son N Tran, Quan Bai, Jane Alty","doi":"10.1007/s00521-022-08090-8","DOIUrl":"https://doi.org/10.1007/s00521-022-08090-8","url":null,"abstract":"<p><p>There is an urgent need, accelerated by the COVID-19 pandemic, for methods that allow clinicians and neuroscientists to remotely evaluate hand movements. This would help detect and monitor degenerative brain disorders that are particularly prevalent in older adults. With the wide accessibility of computer cameras, a vision-based real-time hand gesture detection method would facilitate online assessments in home and clinical settings. However, motion blur is one of the most challenging problems in the fast-moving hands data collection. The objective of this study was to develop a computer vision-based method that accurately detects older adults' hand gestures using video data collected in real-life settings. We invited adults over 50 years old to complete validated hand movement tests (fast finger tapping and hand opening-closing) at home or in clinic. Data were collected without researcher supervision via a website programme using standard laptop and desktop cameras. We processed and labelled images, split the data into training, validation and testing, respectively, and then analysed how well different network structures detected hand gestures. We recruited 1,900 adults (age range 50-90 years) as part of the TAS Test project and developed UTAS7k-a new dataset of 7071 hand gesture images, split 4:1 into clear: motion-blurred images. Our new network, RGRNet, achieved 0.782 mean average precision (mAP) on clear images, outperforming the state-of-the-art network structure (YOLOV5-P6, mAP 0.776), and mAP 0.771 on blurred images. A new robust real-time automated network that detects static gestures from a single camera, RGRNet, and a new database comprising the largest range of individual hands, UTAS7k, both show strong potential for medical and research applications.</p><p><strong>Supplementary information: </strong>The online version contains supplementary material available at 10.1007/s00521-022-08090-8.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"35 11","pages":"8143-8156"},"PeriodicalIF":6.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9741488/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9212557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating deep learning predictions for COVID-19 from X-ray images using leave-one-out predictive densities.","authors":"Sergio Hernández, Xaviera López-Córtes","doi":"10.1007/s00521-023-08219-3","DOIUrl":"https://doi.org/10.1007/s00521-023-08219-3","url":null,"abstract":"<p><p>Early detection of the COVID-19 virus is an important task for controlling the spread of the pandemic. Imaging techniques such as chest X-ray are relatively inexpensive and accessible, but its interpretation requires expert knowledge to evaluate the disease severity. Several approaches for automatic COVID-19 detection using deep learning techniques have been proposed. While most approaches show high accuracy on the COVID-19 detection task, there is not enough evidence on external evaluation for this technique. Furthermore, data scarcity and sampling biases make difficult to properly evaluate model predictions. In this paper, we propose stochastic gradient Langevin dynamics (SGLD) to take into account the model uncertainty. Four different deep learning architectures are trained using SGLD and compared to their baselines using stochastic gradient descent. The model uncertainties are also evaluated according to their convergence properties and the leave-one-out predictive densities. The proposed approach is able to reduce overconfidence of the baseline estimators while also retaining predictive accuracy for the best-performing cases.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"35 13","pages":"9819-9830"},"PeriodicalIF":6.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9900537/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9330144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}