IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Study Of Detecting Malicious URL Using Convnet

[Full Text]

 

AUTHOR(S)

A.Pushpalatha, D.Prabha, S.Sudhakar, V.P.Sriram, P.Kevin Mario Gerard, S.Sanjay

 

KEYWORDS

Deep Learning, Convolutional Neural Network, URL, Malicious Detection

 

ABSTRACT

The A URL is the location of an asset on the network. A URL demonstrates the area of an asset just as the convention used to get to it. Uniform Resource Ls called up with the assistance of web programs. Lately, malignant URLs have turned into the essential instruments to execute digital violations. They have spontaneous substance and assault clueless clients, making them casualties of different sorts of tricks, fraud, malware establishment, information debasement, and so on. It has consequently turned out to be basic to structure hearty systems to recognize malignant URLs in a promising way. Customarily, and most prevalently, this identification is made through the utilization of boycotting techniques. While these techniques are quick, a noteworthy inadequacy is that the framework must always be refreshed, to distinguish recently produced vindictive URLs. Anyway, profound learning models offer the capacity; to sum up, the model's expectations on new concealed URLs. A convolutional neural system model, a particular class of profound neural systems, are equipped for distinguishing inconspicuous examples in the URL strings and uses the distinguished example to order new URL strings.

 

REFERENCES

[1] A new method for Detection of Phishing Websites: URL Detection by Shraddha Parekh, Dhwanil Parikh, Srushti Kotak, and Professor Smita, IEEE Xplore Compliant - Part Number: CFP18BAC -ART, ISBN: 978-1-5386-1974-2, April 2018.
[2] M. N. Feroz and S. Mengel, “Phishing URL detection using URL ranking,” in Big Data (BigData Congress), International Congress on.IEEE, 2015, pp. 635–638.
[3] Sudhakar Sengan, S. Chenthur Pandian, Secure Packet Encryption and Key Exchange System in Mobile Ad hoc Network, Journal of Computer Science 8 (6): 908-912, 2012
[4] M. Khonji, Y. Iraqi, and A. Jones, “Phishing detection: a literature survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp.2091–2121, 2013.
[5] H. Huang, L. Qian, and Y. Wang, “An SVM-based technique to detect phishing URLs,” Information Technology Journal, vol. 11, no. 7, p. 921, 2012.
[6] Sengan Sudhakar, S. Chenthur PandianHybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 21, No. 4, 2016
[7] D. Chiba, K. Tobe, T. Mori, and S. Goto, “Detecting malicious websites by learning IP address features,” in Applications and the Internet (SAINT), 12th International Symposium on. IEEE, 2012, pp. 29–39.
[8] M. Cova, C. Kruegel, and G. Vigna, “Detection and analysis of drive-by-download attacks and malicious javascript code,” in Proceedings of the 19th international conference on World Wide Web. ACM, 2010, pp.281–290.
[9] B. Liang, J. Huang, F. Liu, D. Wang, D. Dong, and Z. Liang, “Malicious web pages detection based on abnormal visibility recognition,” in E-Business and Information System Security, EBISS ’09. International Conference on. IEEE, 2009, pp. 1–5.
[10] Sudhakar Sengan, S.Chenthur Pandian, Trustworthy Position-Based Routing to Mitigate against the Malicious Attacks to Signifies Secured Data Packet using Geographic Routing Protocol in Manet, WSEAS Transactions on Communications, Issue 11, Vol 12, 2013
[11] Y. Choi, T. Kim, and S. Choi, “Automatic detection for JavaScript obfuscation attacks in web pages through string pattern analysis,” International Journal of Security and Its Applications, vol. 4, no. 2, pp. 13–26, 2010.
[12] Hung Le, Quang Pham, Doyen Sahoo, Steven C.H Ho, “URL Net: Learning a URL Representation with Deep Learning for Malicious URL Detection,” arXiv: 1802.03162v2 Mar 2018.
[13] Doyen Sahoo, Chenghao Liu, and Steven C.H.Hoi “Malicious URL Detection using Machine Learning A Survey,” 2016.
[14] Abubakr Sirageldin, Baharum B. Baharubin, and Low Tang Jung, “Malicious Web Page Detection: A Machine Learning Approach,” Advances in Computer Science and Its Applications, Springer-Verlag Berlin Heidelberg 2014
[15] Mohammed Al-Janabi, Ed de Quincey, Peter Andras, “Using Supervised Machine Learning Algorithms to Detect suspicious URLs in online social networks,” Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017.
[16] Huan-huan Wang, Long Yu, Sheng-wei Tian, Yong-fang Peng, and Xin-jun Pei. 2019. Bidirectional LSTM Malicious web pages detection algorithm based on convolutional neural network and independent recurrent neural network. Applied Intelligence (2019), 1–11.
[17] Betul Altay, Tansel Dokeroglu, and Ahmet Cosar. Context-sensitive and keyword density-based supervised machine learning techniques for malicious webpage detection. Soft Computing, 2018.
[18] K.Devipriya, D.Prabha, V.Pirya, S.Sudhakar Deep Learning Sentiment Analysis for Recommendations in Social Applications, International Journal of Scientific & Technology Research, vol. 9, issue 01, January 2020.
[19] R. Gowthamani, K.Sasi Kala Rani, E.Mohanraj, S.Sudhakar, Enhancing Security Amid BlockchainTechnology –A Quick Review, International Journal of Scientific & Technology Research vol.9, Issue 02, February 2020
[20] Dr.S.Sudhakar1, Dr.N.Satheesh2, Dr.S.Balu3, Amireddy Srinish Reddy4, Dr.G.Murugan, Optimizing Joins in a Map-Reduce for Data Storage and Retrieval Performance Analysis of Query Processing in HDFS for Big Data, International Journal of Advanced Trends in Computer Science and Engineering, Vol.8, No.5,2019, https://doi.org/10.30534/ijatcse/2019/33852019.