deepBF: Malicious URL detection using Learned Bloom Filter and Evolutionary Deep Learning

03/18/2021
by   Ripon Patgiri, et al.
0

Malicious URL detection is an emerging research area due to continuous modernization of various systems, for instance, Edge Computing. In this article, we present a novel malicious URL detection technique, called deepBF (deep learning and Bloom Filter). deepBF is presented in two-fold. Firstly, we propose a learned Bloom Filter using 2-dimensional Bloom Filter. We experimentally decide the best non-cryptography string hash function. Then, we derive a modified non-cryptography string hash function from the selected hash function for deepBF by introducing biases in the hashing method and compared among the string hash functions. The modified string hash function is compared to other variants of diverse non-cryptography string hash functions. It is also compared with various filters, particularly, counting Bloom Filter, Kirsch et al., and Cuckoo Filter using various use cases. The use cases unearth weakness and strength of the filters. Secondly, we propose a malicious URL detection mechanism using deepBF. We apply the evolutionary convolutional neural network to identify the malicious URLs. The evolutionary convolutional neural network is trained and tested with malicious URL datasets. The output is tested in deepBF for accuracy. We have achieved many conclusions from our experimental evaluation and results and are able to reach various conclusive decisions which are presented in the article.

READ FULL TEXT
research
06/06/2021

robustBF: A High Accuracy and Memory Efficient 2D Bloom Filter

Bloom Filter is an important probabilistic data structure to reduce memo...
research
03/10/2023

Optimal-Hash Exact String Matching Algorithms

String matching is the problem of finding all the occurrences of a patte...
research
05/28/2023

Image Hash Minimization for Tamper Detection

Tamper detection using image hash is a very common problem of modern day...
research
02/07/2023

Homomorphic Hashing Based on Elliptic Curve Cryptography

For avoiding the exposure of plaintexts in cloud environments, some homo...
research
06/14/2015

Compressing Convolutional Neural Networks

Convolutional neural networks (CNN) are increasingly used in many areas ...
research
02/09/2018

URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection

Malicious URLs host unsolicited content and are used to perpetrate cyber...
research
02/11/2020

Superbloom: Bloom filter meets Transformer

We extend the idea of word pieces in natural language models to machine ...

Please sign up or login with your details

Forgot password? Click here to reset