• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于BERT的恶意URL识别方法。

BERT-Based Approaches to Identifying Malicious URLs.

作者信息

Su Ming-Yang, Su Kuan-Lin

机构信息

Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan City 333, Taiwan.

出版信息

Sensors (Basel). 2023 Oct 16;23(20):8499. doi: 10.3390/s23208499.

DOI:10.3390/s23208499
PMID:37896591
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10610561/
Abstract

Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. In this study, a bidirectional encoder representation from a transformers-based (BERT) model was devised to tokenize URL strings, employing its self-attention mechanism to enhance the understanding of correlations among tokens. Subsequently, a classifier was employed to determine whether a given URL was malicious. In evaluating the proposed methods, three different types of public datasets were utilized: a dataset consisting solely of URL strings from Kaggle, a dataset containing only URL features from GitHub, and a dataset including both types of data from the University of New Brunswick, namely, ISCX 2016. The proposed system achieved accuracy rates of 98.78%, 96.71%, and 99.98% on the three datasets, respectively. Additionally, experiments were conducted on two datasets from different domains-the Internet of Things (IoT) and Domain Name System over HTTPS (DoH)-to demonstrate the versatility of the proposed model.

摘要

恶意统一资源定位符(URL)在网络攻击中很常见,尤其是在旨在窃取敏感信息或传播恶意软件的网络钓鱼企图中。因此,准确检测恶意URL至关重要。先前的研究已经探索了使用深度学习模型来识别恶意URL,方法是将URL字符串分割为字符级或单词级令牌,并嵌入和使用经过训练的模型来区分URL。在本研究中,设计了一种基于变换器的双向编码器表示(BERT)模型来对URL字符串进行令牌化,利用其自注意力机制来增强对令牌之间相关性的理解。随后,使用分类器来确定给定的URL是否为恶意URL。在评估所提出的方法时,使用了三种不同类型的公共数据集:一个仅由来自Kaggle的URL字符串组成的数据集、一个仅包含来自GitHub的URL特征的数据集,以及一个包括来自新不伦瑞克大学的两种类型数据的数据集,即ISCX 2016。所提出的系统在这三个数据集上分别实现了98.78%、96.71%和99.98%的准确率。此外,还在来自不同领域的两个数据集——物联网(IoT)和超文本传输安全协议(HTTPS)上的域名系统(DoH)——上进行了实验,以证明所提出模型的通用性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/a360673fd62c/sensors-23-08499-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/527e73026230/sensors-23-08499-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/2dc68948f1c1/sensors-23-08499-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/ac042a218532/sensors-23-08499-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/34b2329f46df/sensors-23-08499-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/4b893298693e/sensors-23-08499-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/929909ef1502/sensors-23-08499-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/a31976ded6cf/sensors-23-08499-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/9ce6a8ef5534/sensors-23-08499-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/20b73875ede1/sensors-23-08499-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/3267fb93cba7/sensors-23-08499-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/490e186acf22/sensors-23-08499-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/e20c07819cbe/sensors-23-08499-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/a360673fd62c/sensors-23-08499-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/527e73026230/sensors-23-08499-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/2dc68948f1c1/sensors-23-08499-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/ac042a218532/sensors-23-08499-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/34b2329f46df/sensors-23-08499-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/4b893298693e/sensors-23-08499-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/929909ef1502/sensors-23-08499-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/a31976ded6cf/sensors-23-08499-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/9ce6a8ef5534/sensors-23-08499-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/20b73875ede1/sensors-23-08499-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/3267fb93cba7/sensors-23-08499-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/490e186acf22/sensors-23-08499-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/e20c07819cbe/sensors-23-08499-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/23d0/10610561/a360673fd62c/sensors-23-08499-g013.jpg

相似文献

1
BERT-Based Approaches to Identifying Malicious URLs.基于BERT的恶意URL识别方法。
Sensors (Basel). 2023 Oct 16;23(20):8499. doi: 10.3390/s23208499.
2
An intelligent identification and classification system for malicious uniform resource locators (URLs).一种针对恶意统一资源定位符(URL)的智能识别与分类系统。
Neural Comput Appl. 2023 Apr 20:1-17. doi: 10.1007/s00521-023-08592-z.
3
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).基于机器学习模型的恶意统一资源定位器 (URL) 集成分类方法。
PLoS One. 2024 May 31;19(5):e0302196. doi: 10.1371/journal.pone.0302196. eCollection 2024.
4
An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models.基于机器学习和深度学习模型的词汇、网络和基于内容的特征评估在恶意 URL 检测中的应用。
Comput Intell Neurosci. 2022 Aug 25;2022:3241216. doi: 10.1155/2022/3241216. eCollection 2022.
5
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.
6
Malicious URL Detection Based on Associative Classification.基于关联分类的恶意URL检测
Entropy (Basel). 2021 Jan 31;23(2):182. doi: 10.3390/e23020182.
7
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators.基于深度学习的现代安全中基于统一资源定位器的网络钓鱼检测创新技术。
Sensors (Basel). 2023 Apr 30;23(9):4403. doi: 10.3390/s23094403.
8
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM.TSFN:一种使用BERT和LSTM的新型恶意流量分类方法
Entropy (Basel). 2023 May 19;25(5):821. doi: 10.3390/e25050821.
9
Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.利用序列和并行 ML 技术检测网络钓鱼 URL:比较分析。
Sensors (Basel). 2023 Mar 26;23(7):3467. doi: 10.3390/s23073467.
10
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.

引用本文的文献

1
Innovative QR Code System for Tamper-Proof Generation and Fraud-Resistant Verification.用于防篡改生成和防伪验证的创新二维码系统。
Sensors (Basel). 2025 Jun 20;25(13):3855. doi: 10.3390/s25133855.
2
An integrated CSPPC and BiLSTM framework for malicious URL detection.一种用于恶意URL检测的集成CSPPC和双向长短期记忆网络框架。
Sci Rep. 2025 Feb 24;15(1):6659. doi: 10.1038/s41598-025-91148-z.
3
Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features.

本文引用的文献

1
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM.TSFN:一种使用BERT和LSTM的新型恶意流量分类方法
Entropy (Basel). 2023 May 19;25(5):821. doi: 10.3390/e25050821.
2
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.基于转换器的迁移学习和多模型视觉表示的可解释恶意软件检测系统。
Sensors (Basel). 2022 Sep 7;22(18):6766. doi: 10.3390/s22186766.
3
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
基于上下文和多特征的漏洞检测:一种基于上下文切片和多特征的漏洞检测框架
Sensors (Basel). 2024 Feb 20;24(5):1351. doi: 10.3390/s24051351.
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.
4
Datasets for phishing websites detection.用于网络钓鱼网站检测的数据集。
Data Brief. 2020 Oct 23;33:106438. doi: 10.1016/j.dib.2020.106438. eCollection 2020 Dec.