Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Future Internet  /  Vol: 14 Par: 11 (2022)  /  Artículo
ARTÍCULO
TITULO

Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models

Sanjiban Sekhar Roy    
Ali Ismail Awad    
Lamesgen Adugnaw Amare    
Mabrie Tesfaye Erkihun and Mohd Anas    

Resumen

In today?s world, phishing attacks are gradually increasing, resulting in individuals losing valuables, assets, personal information, etc., to unauthorized parties. In phishing, attackers craft malicious websites disguised as well-known, legitimate sites and send them to individuals to steal personal information and other related private details. Therefore, an efficient and accurate method is required to determine whether a website is malicious. Numerous methods have been proposed for detecting malicious uniform resource locators (URLs) using deep learning, machine learning, and other approaches. In this study, we have used malicious and benign URLs datasets and have proposed a detection mechanism for detecting malicious URLs using recurrent neural network models such as long short-term memory (LSTM), bidirectional long short-term memory (Bi-LSTM), and the gated recurrent unit (GRU). Experimental results have shown that the proposed mechanism achieved an accuracy of 97.0% for LSTM, 99.0% for Bi-LSTM, and 97.5% for GRU, respectively.

 Artículos similares

       
 
Denis Rangelov, Philipp Lämmel, Lisa Brunzel, Stephan Borgert, Paul Darius, Nikolay Tcholtchev and Michell Boerger    
The constant increase in volume and wide variety of available Internet of Things (IoT) devices leads to highly diverse software and hardware stacks, which opens new avenues for exploiting previously unknown vulnerabilities. The ensuing risks are amplifie... ver más
Revista: Future Internet

 
Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios    
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial... ver más
Revista: Future Internet

 
Vikas Tomer and Sachin Sharma    
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amoun... ver más
Revista: Future Internet

 
Nejood Faisal Abdulsattar, Firas Abedi, Hayder M. A. Ghanimi, Sachin Kumar, Ali Hashim Abbas, Ali S. Abosinnee, Ahmed Alkhayyat, Mustafa Hamid Hassan and Fatima Hashim Abbas    
Flying ad hoc networks (FANETs) or drone technologies have attracted great focus recently because of their crucial implementations. Hence, diverse research has been performed on establishing FANET implementations in disparate disciplines. Indeed, civil a... ver más

 
Rubayyi Alghamdi and Martine Bellaiche    
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastruc... ver más
Revista: IoT