2021
DOI: 10.1109/access.2021.3049625
|View full text |Cite
|
Sign up to set email alerts
|

Malicious URL Detection Based on a Parallel Neural Joint Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 29 publications
(30 reference statements)
0
22
0
1
Order By: Relevance
“…The attacker usually builds a website identical to the target or embeds the exploit code of browser vulnerabilities on the webpage. Then, it tricks the victim into clicking on these links to obtain the victim's information or control the victim's computer [1]. In many circumstances, people do not check the complete website URL, and the attacker can obtain essential and personal information once they visit a malicious website [2].…”
Section: Introductionmentioning
confidence: 99%
“…The attacker usually builds a website identical to the target or embeds the exploit code of browser vulnerabilities on the webpage. Then, it tricks the victim into clicking on these links to obtain the victim's information or control the victim's computer [1]. In many circumstances, people do not check the complete website URL, and the attacker can obtain essential and personal information once they visit a malicious website [2].…”
Section: Introductionmentioning
confidence: 99%
“…However, Molah et al [18] achieved better accuracy of 97.36% using RF in an intelligent system for detecting phishing websites using different ML techniques. Their dataset was adopted from the University of California Irvine Machine Learning Repository (UCI-ML) [19]. A total of 30 lexical, network, and contentbased features were extracted to classify the URLs.…”
Section: ) Lexical Content-based and Network-based Features Studiesmentioning
confidence: 99%
“…In order to detect and categorize malicious URLs Selvaganapathy et al [30].proposed a methodology based on a stacked restricted Boltzmann machine for feature selection with deep NN. The dataset was formed from MalwareDomainList; UCI-ML Repository: Spambase Dataset [31]; UCI-ML Repository: Phishing Dataset [19]; DMOZ [32]; and Alexa [16]. A total of 98 features were extracted.…”
Section: ) Lexical Content-based and Network-based Features Studiesmentioning
confidence: 99%
“…For the purpose of detecting harmful URLs, Yuan et al [106] introduced a parallel neural joint model approach. The semantic and text features were included in the method by integrating a parallel joint neural network incorporating capsule network (CapsNet) and independent RNN (IndRNN) to improve the detection accuracy.…”
Section: Malicious Traffic In a Cloud Environmentmentioning
confidence: 99%