Publication:
Transformer-Based Model for Malicious URL Classification

Date
2023
Authors
Do N.Q.
Selamat A.
Lim K.C.
Krejcar O.
Ghani N.A.M.
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers Inc.
Research Projects
Organizational Units
Journal Issue
Abstract
In recent years, cyber threats including malicious software, virus, spam, and phishing have grown aggressively via compromised Uniform Resource Locators (URLs). However, the current phishing URL detection solutions based on supervised learning use labeled data for training and classification, leading to the dependency on known attacking patterns. These approaches have limitations in fighting against evolving phishing tactics, resulting in a lack of robustness and sustainability. In this study, an unsupervised transformer model is proposed to address the drawbacks of the existing methods which use supervised learning to combat zero-day phishing attacks. Specifically, Bidirectional Encoder Representations from Transformers (BERT) is adopted in this paper to classify malicious URLs. The proposed model was trained on a public dataset and benchmarked with various baseline models using several performance metrics. Results obtained from the experiments showed that BERT-Medium achieved the highest detection accuracy of 98.55% among numerous transformer based models and outperformed other text embedding and deep learning techniques, indicating that the proposed solution is effective and robust in detecting phishing URLs. � 2023 IEEE.
Description
Keywords
malicious URL classification , natural language processing , phishing detection , transformer model , unsupervised learning , Classification (of information) , Computer crime , Learning algorithms , Learning systems , Natural language processing systems , Supervised learning , Viruses , Zero-day attack , 'current , Cyber threats , Labeled data , Language processing , Malicious uniform resource locator classification , Natural language processing , Natural languages , Phishing , Phishing detections , Transformer modeling , Deep learning
Citation
Collections