Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning

نویسندگان

چکیده

Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded email or Twitter used to lure vulnerable internet users implement malicious data their systems. This may result compromised of the systems, scams, other such cyberattacks. These attacks hijack huge quantities available data, incurring heavy financial loss. At same time, Machine Learning (ML) Deep (DL) models paved way for designing that detect URLs accurately classify them. With motivation, current article develops an Artificial Fish Swarm Algorithm (AFSA) with Enabled URL Detection Classification (AFSADL-MURLC) model. The presented AFSADL-MURLC model intends differentiate from genuine URLs. To attain this, initially carries out preprocessing makes use glove-based word embedding technique. In addition, created vector is then passed onto Gated Recurrent Unit (GRU) classification recognize Finally, AFSA applied proposed enhance efficiency GRU technique was experimentally validated using benchmark dataset sourced Kaggle repository. simulation results confirmed supremacy over recent approaches under distinct measures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection

Malicious URLs host unsolicited content and are used to perpetrate cybercrimes. It is imperative to detect them in a timely manner. Traditionally, this is done through the usage of blacklists, which cannot be exhaustive, and cannot detect newly generated malicious URLs. To address this, recent years have witnessed several efforts to perform Malicious URL Detection using Machine Learning. The mo...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

Efficient Malicious URL based on Feature Classification

Deceitful and malicious web sites pretense significant danger to desktop security, integrity and privacy. Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user‘s computer have become the main opportunity for the proliferation of malicious code. Detection of malicious URL has become difficult because of the phishing campaig...

متن کامل

Malicious URL Detection using Machine Learning: A Survey

Malicious URL, a.k.a. malicious website, is a common and serious threat to cybersecurity. Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure unsuspecting users to become victims of scams (monetary loss, theft of private information, and malware installation), and cause losses of billions of dollars every year. It is imperative to detect and act on such th...

متن کامل

Routing Optimization Based on Artificial Fish Swarm Algorithm

For multi-objective optimization in the QoS routing, this paper combines the artificial fish swarm algorithm and ant colony algorithm and tabu search algorithm, proposes a new improved algorithm, and delves into the application of solving the QoS routing. One main work in this paper is to put forward a mixed algorithm integrating artificial fish swarm and ant colony. Firstly, we randomly genera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.031371