Malicious URL Detector for low power consumption using Blacklist
DOI:
https://doi.org/10.61841/00q1yg93Keywords:
URL, convoluted, Trojans, blacklistAbstract
There have been many attacks on websites, and information has been hacked using viruses and Trojans through the URL or Universal Resource Locator of the website. This problem can be controlled by using a program called a URL detector that uses a blacklist, which basically denies access to the website when malicious activity is detected. A convoluted neural network is used to deny access to the URL if it does not match with the existing URLs in the blacklist. This method of scanning for malicious URLs is efficient and power-saving in most aspects.
Downloads
References
[1] P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “Phishnet: Predictive dictive blacklisting to detect Phishing
attacks,” in 2010 Proceedings IEEE INFOCOM. San Diego, CA, USA: Citeseer, 14-19 Mar 2010, pp. 1–5.
[2] D. Sahoo, C. Liu, and S. C. H. Hoi, “Malicious URL detection using machine learning: A survey,”
arXiv:1701.07179 [cs.LG], 2017.
[3] J. Saxe and K. Berlin, “eXpose: a character-level convolutional neural network with embeddings for detecting
malicious URLs, file paths and registry eys." arXiv:1702.08568 [cs:CR], 2017.
[4] B. Cui, S. He, X. Yao, and P. Shi, “Malicious url detection with face extraction based on machine
learning,” International Journal of High Performance Computing and Networking, vol. 12, no. 2, 2018,
DOI:10.1504/IJHPCN.2018.10015545.
[5] B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating url blacklist generation with similarity
search approach,” IEICE Transactions on Information and Systems, vol. 99, no. 4, pp. 873–882, 2016.
[6] S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing
blacklists,” in Sixth Conference on Email and Anti-Spam (CEAS). California, USA, 2009.
[7] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond black- lists: learning to detect malicious web sites
from suspicious URLs,” in Computational Science and Engineering (CSE) and Embedded and Ubiquitous
Computing (EUC), 2017 IEEE International Conference on, vol. 1. IEEE, 2017, pp. 143–150.
[8] A. C. Bahnsen, E. C. Bohorquez, S. Villegas, J. Vargas, and F. A. González, “Classifying phishing urls using recurrent neural networks,” in Electronic Crime Research (eCrime), 2017 APWG Symposium on. IEEE, 2017, pp. 1–8.
[9] X. Zhang, J. Zhao, and Y. LeCun, “Character-level convolutional networks for text classification,” in Advances in neural information processing systems, 2015, pp. 647-957.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.