An integrated CSPPC and BiLSTM framework for malicious URL detection

被引:0
|
作者
Zhou, Jinyang [1 ]
Zhang, Kun [1 ]
Bilal, Anas [1 ]
Zhou, Yu [1 ]
Fan, Yukang [1 ]
Pan, Wenting [1 ]
Xie, Xin [1 ]
Peng, Qi [1 ]
机构
[1] Hainan Normal Univ, Sch Informat Sci & Technol, Haikou 571158, Hainan, Peoples R China
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
Phishing; Malicious URL detection; Deep learning; BiLSTM; CBAM; SPP;
D O I
10.1038/s41598-025-91148-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of the internet, phishing attacks have become more diverse, making phishing website detection a key focus in cybersecurity. While machine learning and deep learning have led to various phishing URL detection methods, many remain incomplete, limiting accuracy. This paper proposes CSPPC-BiLSTM, a malicious URL detection model based on BiLSTM (Bidirectional Long Short-Term Memory, BiLSTM). The model processes URL character sequences through an embedding layer and captures contextual information via BiLSTM. By integrating CBAM (Convolutional Block Attention Module, CBAM), it applies channel and spatial attention to highlight key features and transforms URL sequence features into a spatial matrix. The SPP (Spatial Pyramid Pooling, SPP) module enables multi-scale pooling. Finally, a fully connected layer fuses features, and dropout regularization enhances robustness. Compared to CharBiLSTM, CSPPC-BiLSTM significantly improves detection accuracy. Evaluated on two datasets, Grambedding (balanced) and Mendeley AK Singh 2020 phish (imbalanced)-and compared with six baselines, it demonstrates strong generalization and accuracy. Ablation experiments confirm the critical role of CBAM and SPP in boosting performance.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Privacy Preserving Machine Learning for Malicious URL Detection
    Shaik, Imtiyazuddin
    Emmadi, Nitesh
    Tupsamudre, Harshal
    Narumanchi, Harika
    Bhattachar, Rajan Mindigal Alasingara
    DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2021 WORKSHOPS, 2021, 1479 : 31 - 41
  • [22] Malicious URL and Intrusion Detection using Machine Learning
    Hamza, Amr
    Hammam, Farah
    Abouzeid, Medhat
    Ahmed, Mohammad Arsalan
    Dhou, Salam
    Aloul, Fadi
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 795 - 800
  • [23] An intrinsic evaluator for embedding methods in malicious URL detection
    Chen, Qisheng
    Kazumasa, Omote
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [24] Malicious URL Detection Based on Multiple Feature Fusion
    Wu, Sen-Yan
    Luo, Xi
    Wang, Wei-Ping
    Qin, Yan
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (09): : 2916 - 2934
  • [25] A Novel Approach for Malicious URL Detection Based on the Joint Model
    Yuan, JianTing
    Liu, YiPeng
    Yu, Long
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Effective Malicious URL Detection by Using Generative Adversarial Networks
    Geng, Jinbu
    Li, Shuhao
    Liu, Zhicheng
    Cheng, Zhenyu
    Fan, Li
    WEB ENGINEERING (ICWE 2022), 2022, 13362 : 341 - 356
  • [27] A Malicious URL Detection Model Based on Convolutional Neural Network
    Wang, Zhiqiang
    Ren, Xiaorui
    Li, Shuhao
    Wang, Bingyan
    Zhang, Jianyi
    Yang, Tao
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] Research on Malicious URL Detection Technology Based on BERT Model
    Chang, Weiling
    Du, Fei
    Wang, Yijing
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 340 - 345
  • [29] Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts
    Tan, Guolin
    Zhang, Peng
    Liu, Qingyun
    Liu, Xinran
    Zhu, Chunge
    Dou, Fenghu
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 737 - 743
  • [30] Malicious webpages analysis and detection algorithm based on BiLSTM
    Wang H.-H.
    Yu L.
    Tian S.-W.
    Luo S.-Q.
    Pei X.-J.
    International Journal of Electronic Business, 2020, 15 (04) : 351 - 367