Malicious URL detection via spherical classification


We introduce and test a binary classification method aimed at detecting malicious URL on the basis of some information on both the URL syntax and its domain properties. Our method belongs to the class of supervised machine learning models, where, in particular, classification is performed by using information coming from a set of URL’s (samples in machine learning parlance) whose class membership is known in advance. The main novelty of our approach is in the use of a spherical separation-based algorithm, instead of SVM-type methods, which are based on hyperplanes as separation surfaces in the sample space. In particular we adopt a simplified spherical separation model which runs in O(tlogt) time (t is the number of samples in the training set), and thus is suitable for large-scale applications. We test our approach using different sets of features and report the results in terms of training correctness according to the well-established tenfold cross-validation paradigm.

DOI: 10.1007/s00521-016-2374-9

Extracted Key Phrases

10 Figures and Tables

Cite this paper

@article{Astorino2016MaliciousUD, title={Malicious URL detection via spherical classification}, author={Annabella Astorino and Antonino Chiarello and Manlio Gaudioso and Angotti Piccolo}, journal={Neural Computing and Applications}, year={2016}, pages={1-7} }