TY - CHAP
T1 - Deep learning architecture for big data analytics in detecting intrusions and malicious URL
AU - Harikrishnan, N. B.
AU - Vinayakumar, R.
AU - Soman, K. P.
AU - Poornachandran, Prabaharan
AU - Annappa, B.
AU - Alazab, Mamoun
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2020.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2019
Y1 - 2019
N2 - Security attacks are one of the major threats in today’s world. These attacks exploit the vulnerabilities in a system or online sites for financial gain. By doing so, there arises a huge loss in revenue and reputation for both government and private firms. These attacks are generally carried out through malware interception, intrusions, phishing uniform resource locator (URL). There are techniques like signature-based detection, anomaly detection, state full protocol to detect intrusions, blacklisting for detecting phishing URL. Even though these techniques claim to thwart cyberattacks, they often fail to detect new attacks or variants of existing attacks. The second reason why these techniques fail is the dynamic nature of attacks and lack of annotated data. In such a situation, we need to propose a system which can capture the changing trends of cyberattacks to some extent. For this, we used supervised and unsupervised learning techniques. The growing problem of intrusions and phishing URLs generates a need for a reliable architectural-based solution that can efficiently identify intrusions and phishing URLs. This chapter aims to provide a comprehensive survey of intrusion and phishing URL detection techniques and deep learning. It presents and evaluates a highly effective deep learning architecture to automat intrusion and phishing URL Detection. The proposed method is an artificial intelligence (AI)-based hybrid architecture for an organization which provides supervised and unsupervised-based solutions to tackle intrusions, and phishing URL detection. The prototype model uses various classical machine learning (ML) classifiers and deep learning architectures. The research specifically focuses on detecting and classifying intrusions and phishing URL detection.
AB - Security attacks are one of the major threats in today’s world. These attacks exploit the vulnerabilities in a system or online sites for financial gain. By doing so, there arises a huge loss in revenue and reputation for both government and private firms. These attacks are generally carried out through malware interception, intrusions, phishing uniform resource locator (URL). There are techniques like signature-based detection, anomaly detection, state full protocol to detect intrusions, blacklisting for detecting phishing URL. Even though these techniques claim to thwart cyberattacks, they often fail to detect new attacks or variants of existing attacks. The second reason why these techniques fail is the dynamic nature of attacks and lack of annotated data. In such a situation, we need to propose a system which can capture the changing trends of cyberattacks to some extent. For this, we used supervised and unsupervised learning techniques. The growing problem of intrusions and phishing URLs generates a need for a reliable architectural-based solution that can efficiently identify intrusions and phishing URLs. This chapter aims to provide a comprehensive survey of intrusion and phishing URL detection techniques and deep learning. It presents and evaluates a highly effective deep learning architecture to automat intrusion and phishing URL Detection. The proposed method is an artificial intelligence (AI)-based hybrid architecture for an organization which provides supervised and unsupervised-based solutions to tackle intrusions, and phishing URL detection. The prototype model uses various classical machine learning (ML) classifiers and deep learning architectures. The research specifically focuses on detecting and classifying intrusions and phishing URL detection.
KW - Anomaly detection
KW - Artificial intelligence-based hybrid architecture
KW - Automat intrusion
KW - Big data
KW - Big data analytics
KW - Computer crime
KW - Data analysis
KW - Data security
KW - Detection techniques
KW - Highly effective deep learning architecture
KW - Information networks
KW - Intrusion classification
KW - Intrusion detection
KW - Invasive software
KW - Knowledge engineering techniques
KW - Machine learning classifiers
KW - Malicious URL detection
KW - Pattern classification
KW - Phishing uniform resource locator
KW - Phishing URL detection
KW - Reliable architectural-based solution
KW - Security attacks
KW - Signature-based detection
KW - Supervised learning techniques
KW - Unsupervised learning
KW - Unsupervised learning techniques
KW - Web sites
UR - http://www.scopus.com/inward/record.url?scp=85117773612&partnerID=8YFLogxK
U2 - 10.1049/PBPC035F_ch14
DO - 10.1049/PBPC035F_ch14
M3 - Chapter
AN - SCOPUS:85117773612
SN - 9781785619755
VL - 1
T3 - IET Professional Applications of Computing Series
SP - 303
EP - 336
BT - Big Data Recommender Systems
A2 - Khalid, Osman
A2 - Khan, Samee
A2 - Zomaya, Albert
PB - Institution of Engineering and Technology
CY - Stevenage, UK
ER -