期刊文献+

基于深度学习的恶意URL识别 被引量:8

Malicious URL Detection Based on Deep Learning
下载PDF
导出
摘要 网络攻击日益成为一个严重的问题.在这些攻击中,恶意URLs经常扮演着重要角色,并被广泛应用到各种类型的攻击,比如钓鱼、垃圾邮件以及恶意软件中.检测恶意链接对于阻止这些攻击具有重要意义.多种技术被应用于恶意URLs的检测,而近年来基于机器学习的方法得到越来越多的重视.但传统的机器学习算法需要大量的特征预处理工作,非常耗时耗力.在本文中,我们提出了一个完全基于词法特征的检测方法.首先,我们训练一个2层的神经网络,得到URLs中的字符的分布表示,然后训练对URL的分布表示生成的特征图像进行分类.在我们的试验中,使用真实数据,取得了精度为0.973和F1为0.918的结果. Increase of cyber-attacks is now becoming a serious problem. Among these attacks, malicious URL often plays an import role. It has been widely used to mount various cyber attacks including phishing, spamming, and malware.Detection of malicious URLs is critical to thwart these attacks. Numerous techniques are developed to detect malicious URLs and machine learning techniques have been explored with increasing attention in recent years. However, traditional machine learning methods require tedious work of features preprocessing and it is very time-consuming. In this study, we propose a detection method based solely on lexical features of URLs. First, we obtain the distributed representation of characters in URLs by training a 2-layer Neural Network(NN). Then we train the Convolutional NN(CNN) to classify feature images which are generated by mapping the URL to its distributed representation. In our experience, we obtained a reasonable accuracy of 97.3% and F1 of 91.8% using the real-world data set.
作者 陈康 付华峥 向勇 CHEN Kang;FU Hua-Zheng;XIANG Yong(Guangdong Research Institute, China Telecom Co. Ltd., Guangzhou 510630, China)
出处 《计算机系统应用》 2018年第6期27-33,共7页 Computer Systems & Applications
基金 广东省重大专项(2015B010109005)
关键词 恶意URLs 机器学习 词法特征 卷积神经网络 malicious URLs machine learning distributed representation of characters Convolutional Neural Network(CNN)
  • 相关文献

参考文献4

二级参考文献32

  • 1卢传友,柳澄,秦维昌.ROC评价法在临床诊断中的应用价值[J].医学影像学杂志,2004,14(9):757-759. 被引量:9
  • 2胡明珠,李康.两种临床诊断方法效果的ROC曲线比较[J].数理医药学杂志,2005,18(4):293-296. 被引量:14
  • 3韩云峰.ROC曲线下面积的计算方法[J].齐齐哈尔医学院学报,2007,28(6):697-698. 被引量:13
  • 4Leder W. Know Your Enemy: Containing Conficker [R]. The Honeynet Project Research Alliance, University of Bonn, Germany, 2009.
  • 5Royal P. On the kraken and bobax bomets[R/OL], http://www.damballa, com/downloads/r_pubs/Kraken Respons pdf, 2009.
  • 6Stone-Gross ],Cova M,Vigna G. Your Botnet is My Botnet:A- nalysis of A Botnet Takeover [C]//ACM Conference on Com- puter and Communications Security(CCS). 2009:635-647.
  • 7Yadav S, Reddy A, Ranjan S. Detecting Algorithmically Genera- ted Malicious Domain Names [A]//10th Annual ACM Confer- ence on Internet Measurement[C]. New York,USA, 2010:48-61.
  • 8Stalmans E, Irwin B. A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network [A]//lnfor- mation Security South Africa(ISSA)[C]. 2011:76-83.
  • 9Jiang N, Zhang Z. Identifying Suspicious Activities through DNS Failure Graph Analysis [A]//Network Protocols (ICNP), the 18th IEEE International Conference [C]. 2010:144-153.
  • 10Yadav S, Reddy A N. Winning with DNS Failures: Strategies for Faster Botnet Detection [A]// 7th International ICST Confe- rence on Security and Privacy in Communication Networks [C]. 2011:133-145.

共引文献50

同被引文献57

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部