{"title":"基于深度神经网络的恶意URL分类","authors":"Mainak Sen, K. Ray, A. Chakrabarti","doi":"10.1109/INDICON52576.2021.9691762","DOIUrl":null,"url":null,"abstract":"One of the most serious cybersecurity threats has been discovered as malicious URL classification. People are duped into believing they are visiting a respectable website, and they are persuaded to provide their credentials by malicious websites. Many cyber crimes, such as phishing, cyberbullying, spamming, and malware, are founded on the hosting of dangerous URLs. The existing methods are slow and rely on manual feature engineering. In this research, we look at Convolutional Neural Networks, Long Short Term Memory, and a hybrid model of CNN followed by LSTM, and we propose a new strategy based on the results. Character embedding, in which each character is treated as a token, and word embedding, in which each word is treated as a token, are both used in our technique. In comparison to the word embedded hybrid mode1(0.988), the character embedded hybrid model has a higher accuracy (.996).","PeriodicalId":106004,"journal":{"name":"2021 IEEE 18th India Council International Conference (INDICON)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Malicious URL Classification Using Deep Neural Network\",\"authors\":\"Mainak Sen, K. Ray, A. Chakrabarti\",\"doi\":\"10.1109/INDICON52576.2021.9691762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most serious cybersecurity threats has been discovered as malicious URL classification. People are duped into believing they are visiting a respectable website, and they are persuaded to provide their credentials by malicious websites. Many cyber crimes, such as phishing, cyberbullying, spamming, and malware, are founded on the hosting of dangerous URLs. The existing methods are slow and rely on manual feature engineering. In this research, we look at Convolutional Neural Networks, Long Short Term Memory, and a hybrid model of CNN followed by LSTM, and we propose a new strategy based on the results. Character embedding, in which each character is treated as a token, and word embedding, in which each word is treated as a token, are both used in our technique. In comparison to the word embedded hybrid mode1(0.988), the character embedded hybrid model has a higher accuracy (.996).\",\"PeriodicalId\":106004,\"journal\":{\"name\":\"2021 IEEE 18th India Council International Conference (INDICON)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 18th India Council International Conference (INDICON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDICON52576.2021.9691762\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 18th India Council International Conference (INDICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDICON52576.2021.9691762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malicious URL Classification Using Deep Neural Network
One of the most serious cybersecurity threats has been discovered as malicious URL classification. People are duped into believing they are visiting a respectable website, and they are persuaded to provide their credentials by malicious websites. Many cyber crimes, such as phishing, cyberbullying, spamming, and malware, are founded on the hosting of dangerous URLs. The existing methods are slow and rely on manual feature engineering. In this research, we look at Convolutional Neural Networks, Long Short Term Memory, and a hybrid model of CNN followed by LSTM, and we propose a new strategy based on the results. Character embedding, in which each character is treated as a token, and word embedding, in which each word is treated as a token, are both used in our technique. In comparison to the word embedded hybrid mode1(0.988), the character embedded hybrid model has a higher accuracy (.996).