Malicious URL and Intrusion Detection using Machine Learning

Cyberattacks are becoming increasingly sophisticated and evolving danger to the Web users. Therefore, addressing the growing threat of cyberattacks and providing automated solutions became a necessity. The purpose of this paper is to use machine learning (ML) techniques for malicious websites detect...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Hamza, Amr (author)
مؤلفون آخرون: Hammam, Farah (author), Abouzeid, Medhat (author), Ahmed, Mohammad Arsalan (author), Dhou, Salam (author), Aloul, Fadi (author)
التنسيق: article
منشور في: 2024
الموضوعات:
الوصول للمادة أونلاين:https://hdl.handle.net/11073/26366
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:Cyberattacks are becoming increasingly sophisticated and evolving danger to the Web users. Therefore, addressing the growing threat of cyberattacks and providing automated solutions became a necessity. The purpose of this paper is to use machine learning (ML) techniques for malicious websites detection and classification, and intrusion detection. Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). Two datasets were utilized to train the MLmodels. The first dataset contains two classes of websites: “malicious” and “benign”. The second dataset has six classes of different network intrusion cyber-attacks: “normal”, “blackhole”, “TCP-SYN”, “PortScan”, “Diversion”, and “Overflow”. Experimental results demonstrated that the ML algorithms were able to achieve high accuracy in predicting website maliciousness and intrusion detection. Using the first dataset, DT KNN, and SVM classifiers exhibited the best performance for detecting malicious URLs with accuracies over 99%. Using the second dataset, the DT classifier proved most suitable for intrusion detection, achieving an accuracy of 95%. This paper suggests the integration of ML techniques into online security systems to enhance their efficacy in detecting and preventing cyber threats.