2022 7th International Conference on Communication and Electronics Systems (ICCES), Journal Year: 2024, Volume and Issue: unknown, P. 860 - 866
Published: Dec. 16, 2024
Language: Английский
2022 7th International Conference on Communication and Electronics Systems (ICCES), Journal Year: 2024, Volume and Issue: unknown, P. 860 - 866
Published: Dec. 16, 2024
Language: Английский
Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 126982 - 126982
Published: Feb. 1, 2025
Language: Английский
Citations
1Computer Networks, Journal Year: 2025, Volume and Issue: unknown, P. 111207 - 111207
Published: March 1, 2025
Language: Английский
Citations
0Journal of theoretical and applied electronic commerce research, Journal Year: 2024, Volume and Issue: 19(4), P. 2919 - 2960
Published: Oct. 26, 2024
The rapid expansion of the internet has led to a corresponding surge in malicious online activities, posing significant threats users and organizations. Cybercriminals exploit uniform resource locators (URLs) disseminate harmful content, execute phishing schemes, orchestrate various cyber attacks. As these evolve, detecting URLs (MURLs) become crucial for safeguarding ensuring secure environment. In response this urgent need, we propose novel machine learning-driven framework designed identify known unknown MURLs effectively. Our approach leverages comprehensive dataset encompassing labels—including benign, phishing, defacement, malware—to engineer robust set features validated through extensive statistical analyses. resulting URL detection system (MUDS) combines supervised learning techniques, tree-based algorithms, advanced data preprocessing, achieving high accuracy 96.83% MURLs. For MURLs, proposed utilizes CL_K-means, modified k-means clustering algorithm, alongside two additional biased classifiers, 92.54% on simulated zero-day datasets. With an average processing time under 14 milliseconds per instance, MUDS is optimized real-time integration into network endpoint systems. These outcomes highlight efficacy efficiency fortifying security by identifying mitigating thereby reinforcing digital landscape against threats.
Language: Английский
Citations
2Expert Systems with Applications, Journal Year: 2024, Volume and Issue: unknown, P. 126036 - 126036
Published: Dec. 1, 2024
Language: Английский
Citations
12022 7th International Conference on Communication and Electronics Systems (ICCES), Journal Year: 2024, Volume and Issue: unknown, P. 860 - 866
Published: Dec. 16, 2024
Language: Английский
Citations
0