Skip to main content

Malicious URL detection by dynamically mining patterns without pre-defined elements

Resource type
Thesis type
(Thesis) M.Sc.
Date created
2012-04-12
Authors/Contributors
Author: Huang, Da
Abstract
Detecting malicious URLs is an essential task in network security intelligence. In this thesis, we make two new contributions beyond the state-of-the-art methods on malicious URL detection. First, instead of using any pre-defined features or fixed delimiters for feature selection, we propose to dynamically extract lexical patterns from URLs. Our novel model of URL patterns provides new flexibility and capability on capturing malicious URLs algorithmically generated by malicious programs. Second, we develop a new method to mine our novel URL patterns, which are not assembled using any pre-defined items and thus cannot be mined using any existing frequent pattern mining methods. Our extensive empirical study using the real data sets from Fortinet, a leader in the network security industry, clearly shows the effectiveness and efficiency of our approach. The data sets are at least two orders of magnitudes larger than those reported in literature.
Document
Identifier
etd7119
Copyright statement
Copyright is held by the author.
Permissions
The author granted permission for the file to be printed and for the text to be copied and pasted.
Scholarly level
Supervisor or Senior Supervisor
Thesis advisor: Pei, Jian
Member of collection
Download file Size
etd7119_DHuang.pdf 964.17 KB

Views & downloads - as of June 2023

Views: 0
Downloads: 0