JOURNAL ARTICLE

Cyber Security and Data Mining: Detecting Malicious URL Using Data Mining Techniques

Abstract

Increasing usage of data generation and utilization, the threat of data exploitation and loss also increases. So, the need for cyber security also increases. Using data mining techniques, we can protect our data from threats that come along with the extensive use of technology. In this paper, we present machine-learning and deep-learning approaches to identify the cyber-attacks that are in the form of malicious URLs (Uniform Resource Locators). The cyber-attackers use malicious URLs as a way of invading the system and propagating malware over the web. When a person accesses such URL, it initiates a predetermined harmful behavior which can result in various cybercrimes such as spamming, phishing, loss of confidentiality, denial-of-service, etc. To prevent suck attacks, we have analyzed the use of Deep Learning (DL) and Machine Learning (ML) algorithms for the detection and classification of malicious URLs. Machine learning algorithms implemented include Gaussian Naïve Bayes (NB), Multinomial Naïve Bayes (NB), Bernoulli Naïve Bayes, and Random Forest Classifier (RFC). Deep learning algorithms that were implemented include RNN, LTSM, GRU, Bidirectional LSTM, ANN, and 1D convolution neural network.

Keywords:
Computer science Data mining Computer security

Metrics

2
Cited By
1.24
FWCI (Field Weighted Citation Impact)
29
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Spam and Phishing Detection
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Cyber Security and Data Mining Techniques

Pranab Kumar GoswamiSunandan BaruahLaba Kr. Thakuria

Journal:   2022 International Conference on Edge Computing and Applications (ICECAA) Year: 2022 Pages: 1427-1431
JOURNAL ARTICLE

Cyber Security using data Mining Techniques: A Survey

Siddharth NayakShivani VermaDeepak Kumar Deshmukh

Journal:   International Journal of Technology Year: 2020 Vol: 10 (2)Pages: 138-142
BOOK

Data Warehousing and Data Mining Techniques for Cyber Security

Anoop Singhal

Advances in information security Year: 2007
BOOK-CHAPTER

Data Mining for Detecting Malicious Executables

Auerbach Publications eBooks Year: 2011 Pages: 109-110
BOOK-CHAPTER

Detecting Trojans Using Data Mining Techniques

Muazzam Ahmed SiddiquiMorgan C. WangJoohan Lee

Communications in computer and information science Year: 2008 Pages: 400-411
© 2026 ScienceGate Book Chapters — All rights reserved.