A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security | Semantic Scholar (2024)

Topics

Binary Classifier (opens in a new tab)State Of The Art (opens in a new tab)Convolutional Neural Network (opens in a new tab)Malicious URL (opens in a new tab)

3 Citations

Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN) and convolutional neural network (CNN) optimized with swarm intelligence
    Somayyeh JafariNasrin Aghaee‐Maybodi

    Computer Science

    Concurrency and Computation: Practice and…

  • 2024

The proposed CGAN‐IWSO‐ResNet50 method is more accurate in detecting phishing attacks than the VGG19, AlexNet, RCNN, DNN + LSTM, and DNN + BiLSTM learning methods.

Artificial Neural Network for Binary and Multiclassification of Network Attacks
    Bauyrzhan OmarovAlma Kostangeldinova Bakhytzhan Kulambayev

    Computer Science, Engineering

    International Journal of Advanced Computer…

  • 2023

This research investigates the potential of leveraging artificial neural networks (ANNs) to identify and classify network intrusions, and highlights the role of ANNs in enhancing the precision of network intrusion detection systems, contributing to the broader field of cybersecurity.

Identification of Botnets and Nodes Attacking Smart Cities by Majority Voting Mechanism and Feature Selection
    Maliheh AraghchiNazbanoo Farzaneh

    Computer Science, Engineering

    2023 13th International Conference on Computer…

  • 2023

The proposed method is more accurate in detecting attacks than methods such as GTO, PSO, HHO, WOA, and JSO and uses the most important features of the network traffic to use the artificial neural network classifier.

65 References

Intelligent phishing detection scheme using deep learning algorithms
    Moruf Akin AdebowaleKhin T. LwinM. A. Hossain

    Computer Science

    J. Enterp. Inf. Manag.

  • 2023

A deep learning-based phishing detection solution that leveraged the universal resource locator and website content such as images, text and frames and the combination of both CNN and LSTM was used to resolve the problem of a large data set and higher classifier prediction performance.

  • 51
  • PDF
Deep Character-Level Anomaly Detection Based on a Convolutional Autoencoder for Zero-Day Phishing URL Detection
    Seok-Jun BuSung-Bae Cho

    Computer Science

    Electronics

  • 2021

This work proposes the combination of a convolution operation to model the character-level URL features and a deep convolutional autoencoder (CAE) to consider the nature of zero-day attacks and demonstrates the superiority of the proposed method by receiver-operating characteristic (ROC) curve analysis.

Performance Analysis of Boosting Techniques for Classificationand Detection of Malicious Websites
    Regis Anne WCarolinJeeva S

    Computer Science

    Proceedings of the First International Conference…

  • 2021

Boosting algorithms such as LGBM, XGBoost and Gradient Boosting are used for predicting phishing URL and Random Forest Classifier is exploited to study URL detection as malicious or benign.

  • 1
Machine learning based phishing detection from URLs
    O. K. SahingozEbubekir BuberÖnder DemirB. Diri

    Computer Science

    Expert Syst. Appl.

  • 2019
  • 421
Botnet attack detection in Internet of Things devices over cloud environment via machine learning
    Muhammad WaqasK. Kumar Abdul Qayoom Qazi

    Computer Science, Engineering

    Concurr. Comput. Pract. Exp.

  • 2022

Different machine learning algorithms, namely, support vector machine, naive Bayes, linear regression, artificial neural network, decision tree, random forest, the fuzzy classifier, K‐nearest neighbor, adaptive boosting, gradient boosting, and tree ensemble have been implemented for botnet attack detection.

  • 52
Detecting Phishing Websites through Deep Reinforcement Learning
    Moitrayee ChatterjeeA. Namin

    Computer Science

    2019 IEEE 43rd Annual Computer Software and…

  • 2019

A novel approach based on deep reinforcement learning to model and detect malicious URLs and is capable of adapting to the dynamic behavior of the phishing websites and thus learn the features associated with phishing website detection.

  • 66
A Deep Learning-Based Framework for Phishing Website Detection
    Lizhen TangQ. Mahmoud

    Computer Science

    IEEE Access

  • 2022

A deep learning-based framework for detecting phishing websites that is implemented as a browser plug-in capable of determining whether there is a phishing risk in real-time when the user visits a web page and gives a warning message and results demonstrate the feasibility of the proposed solution.

  • 31
  • PDF
Detecting Malicious URLs Using Lexical Analysis
    M. MamunMohammad Ahmad RathoreArash Habibi LashkariNatalia StakhanovaA. Ghorbani

    Computer Science

    NSS

  • 2016

A lightweight approach to detection and categorization of the malicious URLs according to their attack type is explored and it is shown that lexical analysis is effective and efficient for proactive detection of these URLs.

  • 133
  • PDF
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
    Wei WangMengxue ZhaoJigang Wang

    Computer Science

    Journal of Ambient Intelligence and Humanized…

  • 2018

This work reconstructs the high-dimensional features of Android applications (apps) and employ multiple CNN to detect Android malware and proposes a hybrid model based on deep autoencoder (DAE) and convolutional neural network (CNN), which shows powerful ability in feature extraction and malware detection.

  • 218
Explainability of Cybersecurity Threats Data Using SHAP
    Rafa AleneziSimone A. Ludwig

    Computer Science

    2021 IEEE Symposium Series on Computational…

  • 2021

Two cyber data sets are investigated, both being five-class data sets, for which the Random Forest Classifier, XGBoost Classification, and the Keras Sequential algorithms are applied, and results confirm that applying the classifiers to generate the models are good choices to detect cybersecurity threats.

  • 20
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Tish Haag

    Last Updated:

    Views: 5938

    Rating: 4.7 / 5 (67 voted)

    Reviews: 90% of readers found this page helpful

    Author information

    Name: Tish Haag

    Birthday: 1999-11-18

    Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

    Phone: +4215847628708

    Job: Internal Consulting Engineer

    Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

    Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.