Next Article in Journal
Optimization of Renewable Energy Supply Chain for Sustainable Hydrogen Energy Production from Plastic Waste
Previous Article in Journal
Innovative Transformation and Valorisation of Red Mill Scale Waste into Ferroalloys: Carbothermic Reduction in the Presence of Alumina
Previous Article in Special Issue
Validation of Instruments for the Improvement of Interprofessional Education through Educational Management: An Internet of Things (IoT)-Based Machine Learning Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model

by
Mohammed Aljebreen
1,
Fatma S. Alrayes
2,
Sumayh S. Aljameel
3 and
Muhammad Kashif Saeed
4,*
1
Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
2
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Saudi Aramco Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
4
Department of Computer Science, Applied College, King Khalid University, P.O. Box 9004, Abha 62529, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(24), 16811; https://doi.org/10.3390/su152416811
Submission received: 4 September 2023 / Revised: 30 October 2023 / Accepted: 2 November 2023 / Published: 13 December 2023

Abstract

:
With the enhancement of the Internet of Things (IoT), smart cities have developed the idea of conventional urbanization. IoT networks permit distributed smart devices to collect and process data in smart city structures utilizing an open channel, the Internet. Accordingly, challenges like security, centralization, privacy (i.e., execution data poisoning and inference attacks), scalability, transparency, and verifiability restrict faster variations of smart cities. Detecting malicious URLs in an IoT environment is crucial to protect devices and the network from potential security threats. Malicious URL detection is an essential element of cybersecurity. It is established that malicious URL attacks mean large risks in smart cities, comprising financial damages, losses of personal identifications, online banking, losing data, and loss of user confidentiality in online businesses, namely e-commerce and employment of social media. Therefore, this paper concentrates on the proposal of a Political Optimization Algorithm by a Hybrid Deep Learning Assisted Malicious URL Detection and Classification for Cybersecurity (POAHDL-MDC) technique. The presented POAHDL-MDC technique identifies whether malicious URLs occur. To accomplish this, the POAHDL-MDC technique performs pre-processing to transform the data to a compatible format, and a Fast Text word embedding process is involved. For malicious URL recognition, a Hybrid Deep Learning (HDL) model integrates the features of stacked autoencoder (SAE) and bi-directional long short-term memory (Bi-LSTM). Finally, POA is exploited for optimum hyperparameter tuning of the HDL technique. The simulation values of the POAHDL-MDC approach are tested on a Malicious URL database, and the outcome exhibits an improvement of the POAHDL-MDC technique with a maximal accuracy of 99.31%.

1. Introduction

At present, there is a development of Internet of Things (IoT) mechanisms in sustainable smart environments [1]. The development of IoT devices has led to enhanced security vulnerabilities, creating general consumers as victims of various kinds of safety attacks by malicious Uniform Resource Locators (URLs), as any devices in a shared IoT system are dependent upon URLs [2]. Hackers often use phishing and spam to trick consumers by clicking malicious URLs, Trojans are embedded into computers, or the delicate data of victims may be leaked [1]. This malicious URL identification technology could assist users in finding malevolent URLs and stop users from malevolent URL attacks. Conventionally, studies on malicious URL recognition adopt blacklist-related techniques for detecting malicious URLs [2]. This technique has several exclusive benefits. It consists of a lower false-positive rate, has a high speed, and is easy to realize. Yet, today, domain generation algorithms (DGA) can produce thousands of diverse malicious field names on a daily basis, which could be identified effectively by classical blacklist-related approaches [3]. To detect malicious URLs, research scholars use an ML approach. However, such techniques should derive the features manually, and hackers can devise such attributes to avoid being recognized [4]. Confronted with the current complicated network, devising a more potentially malevolent URL identification method is a focus of study.
Aggressors can use vulnerable sites to execute malicious intent [5]. For instance, attackers inject cross-site scripting into susceptible sites to acquire the sensitive data of the target or execute phishing. Many solutions have been devised to identify these websites precisely. Such solutions are script-based, URL-related, and web content-related [6]. URL-based identification and content-related detection are the most used methods, while some research was performed on script-based identification. URL-related detection is a superior choice, as it can be a safe and proactive method for distinguishing machines; it can find malicious URLs before the user visits them [7]. Furthermore, identifying malicious URLs has the potential for resource-limited and real-time detection applications such as mobile and IoT devices. Different methods were recommended to find harmful content and malicious websites by extracting attributes from their URLs [8]. Many approaches depend on humans to derive features, whereas specific solutions make use of deep learning (DL) approaches for feature automation. Various sets of features have been used and derived for identifying host information features such as host sponsor and country name, domain features, namely .tk and .com, and lexical features, such as counting of the dots in the URL length and URL [9]. Hackers may utilize evasive approaches to bypass security countermeasures [10]. Hence, any attributes derived from such URLs are misleading since the aggressor could use them to conceal malevolent patterns and the malevolent intent of websites.
This research concentrates on the proposal of a Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection and Classification for Cybersecurity (POAHDL-MDC) technique. The presented POAHDL-MDC technique identifies whether malicious URLs occur or not. To accomplish this, the POAHDL-MDC technique follows pre-processing to transform it to a compatible format, and a Fast Text word embedding process is involved. For malicious URL detection, Hybrid DL (HDL) model integrates the features of SAE and Bi-LSTM. Finally, POA can be used for the optimal hyperparameter tuning of the HDL technique. The simulation results of the POAHDL-MDC methodology can be tested on a benchmark database. In short, the main contributions are given below.
  • An automated POAHDL-MDC model comprising pre-processing, word embedding, HDL recognition, and POA-based hyperparameter tuning is proposed for malicious URL classification. To the best of our knowledge, the POAHDL-MDC methodology has never existed in other studies.
  • The HDL classification method combines the strengths of SAE and BiLSTM models to improve the exactness of malicious URL classification.
  • Hyperparameter optimization of the HDL model employing the POA model, utilizing cross-validation, aids in enhancing the forecast results of the HDLPOA-MDC technique for unseen data.
The rest of the paper is classified as follows. Section 2 produces related works, and Section 3 offers the proposed model. Then, Section 4 offers the result analysis, and Section 5 concludes the paper.

2. Related Works

Patgiri et al. [11] developed a new malicious URL detection method named DL and Bloom Filter (deepBF). DeepBF is obtainable twofold. The authors primarily devised a learned Bloom Filter using a 2D Bloom Filter. The authors experimentally determined the optimal non-cryptography string hash function. Afterwards, the authors devised a malicious URL recognition system utilizing DL. To find malicious URLs, the authors implemented the evolutionary CNN. Wanda and Jie [12] devised a deep learning using a new convolutional neural network (CNN) called URL Deep. Rather than utilizing classical CNNs, the authors employed Dynamic CNNs. It could allow the same signal on a similar CNN channel. URL Deep’s graph was dynamically upgraded after all layers of the network were analyzed.
In [13], an enhanced DL-related phishing detection method was developed by incorporating the strengths of a deep neural network (DNN) and a variational autoencoder (VAE). In the structure presented, the VAE model automatically extracted the basic features of the raw URL by rebuilding the original input URL to enhance phishing URL detection. The aim of Angadi and Shukla’s [14] study was to accumulate a list of significant attributes exploited to classify and detect malicious URLs. This study suggests lexical aspects and host-based URLs for increasing the efficacy of classifiers to detect malicious URLs. Utilizing ML classifiers called RF and AdaBoost techniques, Benign and Malicious URLs are categorized. In [15], the authors introduced a complete prototype of malicious URL detection through ML techniques. Specifically, the authors designed a technique utilizing the AdaBoost approach and tried a precise method of making Malicious URL exposure from an ML perspective.
In [16], the authors assessed many existing DL-oriented character-level-embedding approaches for malicious URL detection. The authors devised DeepURLDetect (DURLD), where raw URLs were encrypted through character-level embedding for transforming and using performance development. To capture different kinds of data in the URL, the authors utilized hidden layers in the DL structure to derive features in character level embedded and used a nonlinear activation function. Alsaedi et al. [17] targeted the enhancement of the recognition exactness of malicious URL recognition by developing and devising a cyber-threat intelligence-related malicious URL identification method through two-step ensemble learning. This study introduced a two-step ensemble-learning approach that combined the RF technique to pre-classify with multilayer perceptron (MLP) for decision-making.
While recent DL models have received significant attention in cybersecurity, the application of metaheuristic algorithms for optimizing hyperparameters of DL methods needs to be explored further. There is a great need to fine-tune hyperparameter values of DL models in cybersecurity tasks, which are computationally intensive and require substantial computational resources. The use of metaheuristics can optimize the DL models to eliminate the human trial and error approach. Addressing these study gaps can lead to the development of more effective and efficient DL-based cybersecurity solutions that are fine-tuned using metaheuristic algorithms, ultimately enhancing overall security posture in an increasingly digital and connected world. Some of the recently developed metaheuristic algorithms are the number hummingbird algorithm (AHA), atom search optimization, sine cosine algorithm (SCA), equilibrium optimizer (EO), the Giant Trevally Optimizer, and the Remora Optimization technique.

3. The Proposed Model

In this study, we present a unique POAHDL-MDC method for programmed recognition and classification of malicious URLs. The POAHDL-MDC approach has several stages of operations, namely pre-processing, Fast Text word embedding, HDL-based malicious URL detection, and POA-based hyperparameter tuning. Figure 1 signifies the workflow of the POAHDL-MDC methodology.

3.1. Pre-Processing

In this stage, with the help of the natural language processing (NLP) text pre-processing method, the URL is pre-processed by eradicating symbols. As URLs are crawled from websites, unnecessary texts such as punctuation, HTML codes, and symbols are eliminated to enhance classifier performance and minimize feature complexity. The gathered text data are transformed to lowercase and normalized. The normalization procedure is twofold. Initially, the text in the unstructured dataset is transformed into a structured word vector. Then, the feature vector scarcity is diminished by eliminating unwanted words and words decreased by rooting words to their original form. The normalization begins with tokenization, after the elimination of stemming, stop words, and lemmatization. Lastly, the words are transformed to their corresponding numerical formats. Stemming is a transforming procedure that converts the words into their roots, for instance, eradicating “ing” from the word and “s” from the plural words. Lemmatization converts the words using a lexical knowledge base into the base form by rooting verbs, for example, ‘took’ to ‘take’.

3.2. Word Embedding Using Fast Text

In this work, the Fast Text technique is employed for the word embedding process. ‘Word embedded’ refers to a distributional representation of words, but all the words are mapped to a shared lower dimension space, and all the words are connected to a d-dimension vector [18]. In various word embedding, fastText does not ignore the word morphology. This approach is dependent upon continuous skip grams. Currently, every word can be determined as a character n -gram. Yet n = 3 , the word rapid is as follows:
< q u ,   q u i ,   u i c ,   i c k ,   c k >
This technique maintains subword data and evaluates valid words embedded in out-of-vocabulary words. Therefore, it offers a vector to hidden words in the trained word embedding.
For learning word representation, fastText, followed by continuous skip grams established by the author, can be easier and work well with a smaller training data count. However, this model disregards the internal world infrastructure. The fastText presents various scoring functions for preserving the subword data.
To provide the word w , the group of n grams performing in w is N w { 1 ,   N } , whereas N denotes the dictionary size of n -grams. The vector representation Z g is allocated to every n -gram n . Therefore, the drive scoring function develops:
s w ,   c = n N w   Z g T V c  
where c denotes the context word, and V c signifies the context vector.

3.3. Malicious URL Detection Using HDL

The HDL model is employed for automated malicious URL detection. The auto-encoder (AE) refers to an unsupervised neural network mechanism that learns the hidden features of an inputted dataset, names the encoding (coding) function, while applying the learned newest feature to recreate the original input dataset, and names the decoding function [19]. AE has o n e hidden layer (HL). Significantly, the input and output layers of the AE are equivalent.
The sigmoid function is applied as s f 1 and s f 2 , where 1 = x 11 , x 12 , , x 1 d l T R l d 1 , b 1 R l d 1 , x 2 = x 21 , x 22 , , x 2 d l T R 2 d r , b 2 R 2 d r h =   [ h 1 , h 2 , , h d h ] T R d h , where h denotes the connection vector between x 1 and x 2 ; b 1 and b 2 represent the deviation vector.
h = f 1 x 1 = s f 1 W 1 X 1 + b 1
x 2 = f 2 h = s f 2 W 2 h + b 2
J ( W , b ) = J ( w 1 , w 2 , b 1 , b 2 ) = i = 1 N x 2 x 1 / 2 N = i = 1 N g θ ( x 2 ) x 1 / 2 N
SAE represents the superposition of more than one A E s . Once the initial AE is implemented, successive AEs are implemented in order until the N - t h , and the resultant output is the SAE superimposition outcome. Equation (7) signifies the variable that all AE disseminates to the following layer.
LSTM is a common kind of recurrent neural network (RNN) and is better suited for modeling time-series data, namely humidity, day-to-day air temperature, seawater salinity, air pressure, and other data attained by text buoys due to their design characteristics. In recent times, a new NN, named LSTM, has been implemented. The three major arithmetical structures in LSTM define that it achieves LSTM based on RNN.
The forgetting door is a way of selecting forget, and is given as follows:
f t = σ W f h t 1 , x t + b f
where f t denotes outcome attained by forgetting gates, and W f shows the vector that defines the input weight; b f represents the bias vector; h t 1 indicates the HL at the final moment; the present input x i ; σ denotes the activation function:
W f [ h t 1 , x i ] = [ W f ] h t 1 x t = W f h W f x h t 1 x t = W f h h t 1 + W f x x t
The input gate chooses the data that must be memorized, and it can be represented as follows:
i t = σ ( W i [ h t 1 , x t ] + b i ) c t = f t c t 1 + i t t a n h ( W c [ h t 1 , x t ] + b c )
where h t 1 denotes resultant output at the final moment. I t denotes the value of the input gate, c t and c t 1 show the activation and cell state at the final moment, W i represents weight in the input gate; a n d   W c denotes the forget gate’s weight. b i shows the input gate’s bias vector; b c represents the forget gate’s bias vector.
The output gate can be represented as:
o t = σ ( W 0 [ h t 1 , x t ] + b o ) h t = 0 t t a n h ( c t )
In Equation (8), h t represents the outcome of the output gate, O t denotes the vector, and b o shows the offset vector.   W o indicates the weights.
LSTM predicts the outcome at a later time, depending on the timing data of the previous time. For certain issues, the present production is relevant to the prior and future states. The principles of LSTM linking two networks remain unchanged. The forward LSTM obtains the previous dataset of input series, and the backward LSTM obtains the future dataset of input:
h r f = L S T M ( W 1 h t 1 , W 2 x t , c t 1 ) h t b = L S T M ( W 3 h t + 1 , W 4 x t , c t + 1 ) H t h r f , h t b
The hidden layer H t of BLSTM at t time involves forward h r f and backward h t b ; W 1 ,   W 2 ,   W 3 and W 4 are correspondingly the represent weight coefficients; x t shows the input at t time; h t denotes the hidden state at time t .
The data transmission process accomplishes the fusion of two approaches in the HDL model: a partially supervised fine-tuning network, presenting the evaluation index, E o , and fine-tuning the weight over the backpropagation technique, especially SAE-implemented unsupervised learning and supervised fine-tuning. In the trained method, the input dataset is mapped towards the HL over the first layer AE using Equations (2)–(4). Then, the AE is superimposed, and the whole network is well-trained until the final A E . The fine-tuning of the whole model by Equation (10) is implemented by applying backpropagation (BP) to attain a better weight.
E o = 1 2 i = 1 N i ( A i F i ) / N
where N characterizes the number of samples, A i shows the actual value, and F i indicates the forecasted value. Based on the SAE output, training the BLSTM network makes predictions for the prediction, training, and testing groups. The outcome can be attained afterwards by passing the comparison of the assessment conditions.

3.4. Hyperparameter Tuning

At the final stage, a POA is employed for optimum hyperparameter tuning of the HDL technique. The POA is a novel meta-heuristic system motivated by political processes like constituency allocation, party formation, party switching, inter-party elections, election campaigns, and government development [20]. POA includes five stages, given below. The party formation and constituency allotment stages take place when the population is initialized, and the residual stages are initialized to run in the loop.
The search agent in the POA includes n political parties as shown in Equation (11), where all the parties ( p r i ) have n members, as shown in Equation (12). p i r j refers to the j - t h members of i - t h party, which can be treated as a candidate solution where p i r j denotes a vector of length d as shown in Equation (13), where d represents the number of decision variables belonging to the optimizer problems. Consequently, the size of populations is the square of n , as shown in Equation (14). Also, n constituencies exist, as shown in Equation (15). The j - t h members in each party contest the election from the j - t h constituencies C j , as modeled by Equation (16).
p r = p r 1 , p r 2 , p r 3 , ,   p r n
p r i = p r i 1 , p r i 2 , p r i 3 ,   , p r i n
p r i j = p r i , 1 j , p r i , 2 j , p r i , 3 j , p r i , d j T
p o p u l a t i o n   S i z e = n 2
C o = C o 1 ,   C o 2 ,   C o 3 , ,   C o n
C o j = p r 1 j , p r 2 j . , p r 3 j ,   p r n j
Election demonstrates how the election procedure is simulated. The best member in every party is named leader, i - t h parties are represented as p r i * and the set having the party leader is signified as p r * , demonstrated in Equation (17). After the election, the constituency winner becomes a parliamentarian. The best member from all the constituencies is regarded as the constituency winner. C o * shows the constituency winners or parliamentarians’ group, whereas C o j * signifies the parliamentarian or winner of the j - t h constituencies, as shown below.
p r * = p r 1 * , p r 2 * , p r 3 * , , p r n *
C o * = C o 1 * ,   C o 2 * ,   C o 3 * , ,   C o n *
In an election campaign, every candidate solution location is upgraded based on the constituency winner ( C o j * ) and the party leader ( p r i * ) is allocated by applying Equations (19) and (20) according to the best candidate in the prior iteration. Once the candidate’s fitness increases, Equation (19) is exploited. Otherwise, Equation (20) is used. In all scenarios, every candidate’s location is firstly upgraded based on the parliamentarian C o j * and the party leader p r i * .   t shows the iteration index, r denotes the random variable within [ 0 ,   1 ] , and m * first possesses the value of k - t h dimensions of the leader of i - t h parties p r i , k * , then parliamentarian c o j , k * .
p r i , k j t + 1 = m * + r m * p r i , k j t i f   p r i , k j t 1 p r i , k j t m *   o r   p r i , k j t 1 p r i , k j t m * m * + 2 r 1 m * p r i , k j t   i f   p r i , k j t 1 m * p r i , k j t o r   p r i , k j t 1 m * p r i , k j t m * + 2 r 1 m * p r i , k j t 1   i f   m * p r i , k j t 1 p r i , k j t   o r   m * p r i , k j t 1 p r i , k j t
p r i , k j t + 1 = m * + 2 r 1 m * p r i , k j t   i f   p r i , k j t 1 p r i , k j t m *   o r   p r i , k j t 1 p r i , k j t m * p r i , k j + r ( p r i , k j t p r i , k j t 1   i f p r i , k j ( t 1 ) m * p f k J   o r   p k r 1 m * p r i , k j t m * + 2 r 1 m * p r i , k j t 1 i f   m * p r i , k j t 1 p r i , k j t   o r   m * p r i , k j t 1 p r i , k j t
In politics, the party-switching phase takes place concurrently with the election campaign stage, but in P O , this phase takes place after the election campaign stage. A parameter called party switching rate λ may be determined, that starts with the maximal value, λ m a x , then declines linearly to 0 , where the user tunes λ m a x . All the party members p d ι are selected with a certain probability, λ , to be switched with an arbitrary party p e r , where it substitutes the minimum fit member in that party. This phase is implemented to balance exploration and exploitation.
The constituency winners, along with the party leaders, are determined after the government formation. The entire parliamentarian C o j * upgrades its location based on the randomly selected constituency winner C o r * based on Equation (21), and if this location update results in some improvement in the fitness of C o j * , the location and fitness of C o j * are upgraded. Now, a in Equation (21) is a random integer within [ 0 ,   1 ] . Remember, C o j * is upgraded to C o j n e w * only if the fitness of C o j n e w * is superior to the fitness of C o j * .
C o j n e w * = C o r * + 2 a 1 C o r * C o j *
Fitness selection is a considerable factor influencing the behavior of the POA method. The hyperparameter selection procedure contains a solution-encoding model to measure the effectiveness of candidate solutions. In this study, POA refers to exactness as the main criterion to plan the fitness function, expressed below:
F i t n e s s = m a x   ( P )
P = T P T P + F P
where TP and FP signify true positive and false positive values, respectively.

4. Results and Discussion

The developed technique is simulated by employing the Python 3.6.5 tool. The presented method is tested on PC i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB SSD, and 1TB HDD. The experimental outcome of the POAHDL-MDC methodology can be assessed by employing a Malicious URL database [21,22,23] comprising 651,191 URLs with four class labels, as represented in Table 1. A set of measures is utilized in order to test the classification outcomes accuracy ( a c c u y ), sensitivity ( s e n s y ), specificity ( s p e c y ), and F-score ( F s c o r e ).
Sensitivity: estimates the proportion of positive samples accurately categorized.
S e n s i t i v i t y = T P T P + F N
Specificity: scales the proportion of negative samples exactly classified.
S p e c i f i c i t y = T N T N + F P
Accuracy scales the proportion of correctly classified samples (positives and negatives) against total samples (number of samples classified).
A c c u r a c y = T P + T N T P + T N + F P + F N
F-score: extends the number of true positives separated by the number of true positives plus the number of false positives.
F-score = 2 T P 2 T P + F P + F N
The confusion matrices of the POAHDL-MDC methodology on malicious URL recognition are shown in Figure 2. The outcome highlights that the POAHDL-MDC method identifies four types of malicious URLs.
In Table 2 and Figure 3, the results of the POAHDL-MDC method, with an 80:20 ratio of TR/TS sets, are displayed. The table values signify an enhanced solution of the POAHDL-MDC system. For example, with 80% of the TR set, the POAHDL-MDC techniques attain an average a c c u y of 98.96%, p r e c n of 95.75%, s e n s y of 95.36%, s p e c y of 99.12%, and an F s c o r e of 95.55%. Also, with 20% of the TS set, the POAHDL-MDC algorithm gains an average a c c u y of 98.94%, p r e c n of 95.78%, s e n s y of 95.24%, s p e c y of 99.12%, and an F s c o r e of 95.50%.
In Table 3 and Figure 4, the classifier results of the POAHDL-MDC method with 70:30 of TR/TS sets are displayed. The result signifies a greater result for the POAHDL-MDC technique. For example, with 70% of the TR set, the POAHDL-MDC algorithm gains an average a c c u y of 99.28%, p r e c n of 97.04%, s e n s y of 97.76%, s p e c y of 99.43%, and an F s c o r e of 97.40%. Additionally, with 30% of the TS set, the POAHDL-MDC technique gains an average a c c u y of 99.31%, p r e c n of 97.21%, s e n s y of 97.82%, s p e c y of 99.45%, and an F s c o r e of 97.51%.
Figure 5 inspects the a c c u y of the POAHDL-MDC algorithm on the t r a i n g and v a l d procedures on the test database. The result implies that the POAHDL-MDC technique gains superior a c c u y values above maximal epochs. Additionally, the enhanced v a l d   a c c u y over t r a i n g   a c c u y demonstrates that the POAHDL-MDC algorithm obtains better results on the test database.
The loss curve of the POAHDL-MDC model at the time of t r a i n g and v a l d is shown on the test database in Figure 6. The result represents the POAHDL-MDC approach gains nearby values of t r a i n g and v a l d loss. It could be detected that the POAHDL-MDC system obtains results efficiently on the test database.
A comprehensive PR analysis of the POAHDL-MDC model applied to the test dataset is illustrated in Figure 7. The figure infers that the POAHDL-MDC system outcomes have greater values of PR. Also, the POAHDL-MDC algorithm has superior PR values in four classes.
In Figure 8, an ROC curve for the POAHDL-MDC model is revealed for the test database. The result reveals that the approach improves ROC values. Further, the POAHDL-MDC approach exhibits greater ROC values in all four classes.
In Table 4 and Figure 9, a clear comparison of the POAHDL-MDC system with existing approaches is made [17]. The results highlight that the LR and RF approaches accomplish the lowest outcome.
At the same time, sequential DL, NB, DT, and CNN techniques achieve closer outcomes. But the POAHDL-MDC technique gains outperforming results with a maximum a c c u y of 99.31%, s e n s y of 97.82%, s p e c y of 99.45%, and F s c o r e of 97.51%. These outcomes confirm the superior solution of the POAHDL-MDC model over other current approaches. The improved URL detection results of the POAHDL-MDC technique are based on the inclusion of POA-based hyperparameter tuning. An application of POA selects optimum hyperparameter values of the HDL technique. Hyperparameters are not learned at the time of training but set earlier to training. They have an essential effect on the performance of the technique, as picking optimal values leads to improved exactness. By use of POA-based hyperparameter tuning, the POAHDL-MDC technique gains superior outcomes by concentrating on the most appropriate features and choosing optimal settings for the algorithm. These results guaranteed enhanced behavior of the POAHDL-MDC method when compared to existing models.

5. Conclusions

In this study, we proposed a new POAHDL-MDC methodology for the automated recognition and classification of malicious URLs. To accomplish this, the POAHDL-MDC approach initially performed data pre-processing to change the data to a compatible format, and a Fast Text word embedding process was involved. For malicious URL detection, the HDL model integrating the features of SAE and Bi-LSTM models was utilized. Lastly, POA was employed for optimum hyperparameter tuning of the HDL methodology. The simulation value of the POAHDL-MDC technology was verified on a benchmark database, and the outcome revealed better results for the POAHDL-MDC methodology for various measures. In future, a hybrid metaheuristic-based feature selection process could be designed to reduce the high dimensionality problem and thereby enhance the detection rate. In addition, future work could examine a combination of many data modalities, such as text, network traffic, and user behavior, into DL models. In addition, new approaches such as attention-based models, graph neural networks, or transformer-based models could be used for capturing complex patterns in URLs and their associated features.

Author Contributions

Conceptualization, M.A. and S.S.A.; Methodology, F.S.A., S.S.A. and M.K.S.; Software, S.S.A.; Validation, F.S.A., S.S.A. and M.K.S.; Investigation, M.A.; Data curation, F.S.A.; Writing–original draft, M.A., F.S.A. and M.K.S.; Writing—review & editing, S.S.A. and M.K.S.; Visualization, F.S.A.; Supervision, M.A.; Project administration, M.K.S.; Funding acquisition, M.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through large group Research Project under grant number (RGP2/117/44). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R319), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. Research Supporting Project number (RSP2024R459), King Saud University, Riyadh, Saudi Arabia. We Would like to thank SAUDI ARAMCO Cybersecurity Chair for funding this project.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing does not apply to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Kim, D.; Shin, J.; Seo, J.T. A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart City Environments. J. Korean Soc. Internet Inf. 2023, 24, 17–26. [Google Scholar]
  2. Sundhari, R.M.; Jaikumar, K. IoT assisted Hierarchical Computation Strategic Making (HCSM) and Dynamic Stochastic Optimization Technique (DSOT) for energy optimization in wireless sensor networks for smart city monitoring. Comput. Commun. 2020, 150, 226–234. [Google Scholar] [CrossRef]
  3. Contreras-Masse, R.; Ochoa-Zezzatti, A.; García, V.; Pérez-Dominguez, L.; Elizondo-Cortés, M. Implementing a novel use of multicriteria decision analysis to select IIoT platforms for smart manufacturing. Symmetry 2020, 12, 368. [Google Scholar] [CrossRef]
  4. Al-Turjman, F.; Zahmatkesh, H.; Shahroze, R. An overview of security and privacy in smart cities’ IoT communications. Trans. Emerg. Telecommun. Technol. 2022, 33, e3677. [Google Scholar] [CrossRef]
  5. Kumar, N.; Goel, V.; Ranjan, R.; Altuwairiqi, M.; Alyami, H.; Asakipaam, S.A. A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City. Secur. Commun. Netw. 2023, 2023, 8168075. [Google Scholar] [CrossRef]
  6. Janet, B.; Nikam, A. Real-Time Malicious URL Detection on Twitch using Machine Learning. In Proceedings of the IEEE 2022 International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India, 16–18 March 2022; pp. 1185–1189. [Google Scholar]
  7. Do Xuan, C.; Nguyen, H.D.; Tisenko, V.N. Malicious URL detection based on machine learning. Int. J. Adv. Comput. Sci. Appl. 2020, 11. [Google Scholar]
  8. Raja, A.S.; Pradeepa, G.; Arulkumar, N. Mudhr: Malicious URL detection using a heuristic rules-based approach. In Proceedings of the AIP Conference Proceedings, Krishnagiri, India, 19 May 2022; AIP Publishing LLC: Melville, NY, USA, 2022; Volume 2393, p. 020176. [Google Scholar]
  9. Swarnkar, M.; Sharma, N.; Kumar Thakkar, H. Malicious URL Detection Using Machine Learning. In Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps; Springer Nature: Singapore, 2022; pp. 199–216. [Google Scholar]
  10. Li, T.; Kou, G.; Peng, Y. Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf. Syst. 2020, 91, 101494. [Google Scholar] [CrossRef]
  11. Patgiri, R.; Biswas, A.; Nayak, S. deepBF: Malicious URL detection using learned bloom filter and evolutionary deep learning. Comput. Commun. 2023, 200, 30–41. [Google Scholar] [CrossRef]
  12. Wanda, P.; Jie, H.J. URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks. Int. J. Netw. Secur. 2019, 21, 971–978. [Google Scholar]
  13. Prabakaran, M.K.; Chandrasekar, A.D.; Meenakshi Sundaram, P. An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. IET Inf. Secur. 2023, 17, 423–440. [Google Scholar] [CrossRef]
  14. Angadi, S.; Shukla, S. Malicious URL Detection Using Machine Learning Techniques. In Intelligent Sustainable Systems: Proceedings of ICISS 2022; Springer Nature: Singapore, 2022; pp. 657–669. [Google Scholar]
  15. Khan, F.; Ahamed, J.; Kadry, S.; Ramasamy, L.K. Detecting malicious URLs using binary classification through the ada boost algorithm. Int. J. Electr. Comput. Eng. (2088–8708) 2020, 10. [Google Scholar]
  16. Srinivasan, S.; Vinayakumar, R.; Arunachalam, A.; Alazab, M.; Soman, K.P. DURLD: Malicious URL Detection using Deep Learning-Based Character-Level Representations. In Malware Analysis Using Artificial Intelligence and Deep Learning; Springer: Berlin/Heidelberg, Germany, 2021; pp. 535–554. [Google Scholar]
  17. Alsaedi, M.; Ghaleb, F.A.; Saeed, F.; Ahmad, J.; Alasli, M. Cyber threat intelligence-based malicious URL detection model using ensemble learning. Sensors 2022, 22, 3373. [Google Scholar] [CrossRef] [PubMed]
  18. Mojumder, P.; Hasan, M.; Hossain, M.F.; Hasan, K.A. A study of fast text word embedding effects in document classification in the bangla language. In Proceedings of the Cyber Security and Computer Science: Second EAI International Conference—ICONCS 2020, Dhaka, Bangladesh, 15–16 February 2020; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 441–453. [Google Scholar]
  19. Wang, Y.; Guo, J.; Yang, Z.; Dou, Y.; Chang, X.; Sun, R.; Zuo, G.; Yang, W.; Liang, C.; Hao, Y.; et al. Computer prediction of seawater sensor parameters in the central arctic region based on hybrid machine learning algorithms. IEEE Access 2020, 8, 213783–213798. [Google Scholar] [CrossRef]
  20. Askari, Q.; Younas, I.; Saeed, M. Political Optimizer: A novel socio-inspired meta-heuristic for global optimization. In Knowledge-Based Systems; Elsevier: Amsterdam, The Netherlands, 2020; Volume 195, p. 105709. [Google Scholar]
  21. Kaggle. Malicious URLs Dataset. Available online: https://www.kaggle.com/sid321axn/malicious-urls-dataset (accessed on 3 September 2023).
  22. PhishTank. Join the Fight against Phishing. Available online: https://phishtank.org/ (accessed on 3 September 2023).
  23. University of New Brunswick. URL Dataset (ISCX-URL2016). Available online: https://www.unb.ca/cic/datasets/url-2016.html (accessed on 3 September 2023).
Figure 1. Workflow of the POAHDL-MDC approach.
Figure 1. Workflow of the POAHDL-MDC approach.
Sustainability 15 16811 g001
Figure 2. Confusion matrices of the POAHDL-MDC method (a,b) 80% of the TR set and 20% of the TS set and (c,d) 70% of the TR set and 30% of the TS set.
Figure 2. Confusion matrices of the POAHDL-MDC method (a,b) 80% of the TR set and 20% of the TS set and (c,d) 70% of the TR set and 30% of the TS set.
Sustainability 15 16811 g002
Figure 3. Classifier outcome of the POAHDL-MDC technique on 80% of the TR set and 20% of the TS set.
Figure 3. Classifier outcome of the POAHDL-MDC technique on 80% of the TR set and 20% of the TS set.
Sustainability 15 16811 g003
Figure 4. Classifier outcome of the POAHDL-MDC technique on 70% of the TR set and 30% of the TS set.
Figure 4. Classifier outcome of the POAHDL-MDC technique on 70% of the TR set and 30% of the TS set.
Sustainability 15 16811 g004
Figure 5. Accuracy curve of the POAHDL-MDC methodology.
Figure 5. Accuracy curve of the POAHDL-MDC methodology.
Sustainability 15 16811 g005
Figure 6. Loss curve of the POAHDL-MDC algorithm.
Figure 6. Loss curve of the POAHDL-MDC algorithm.
Sustainability 15 16811 g006
Figure 7. PR curve of the POAHDL-MDC approach.
Figure 7. PR curve of the POAHDL-MDC approach.
Sustainability 15 16811 g007
Figure 8. ROC curve of the POAHDL-MDC approach.
Figure 8. ROC curve of the POAHDL-MDC approach.
Sustainability 15 16811 g008
Figure 9. A c c u y outcome of the POAHDL-MDC approach with existing methods.
Figure 9. A c c u y outcome of the POAHDL-MDC approach with existing methods.
Sustainability 15 16811 g009
Table 1. Details on the dataset.
Table 1. Details on the dataset.
ClassesNumber of URLs
Benign428,103
Defacement96,457
Phishing94,111
Malware Link32,520
Total No. of URLs651,191
Table 2. Classifier outcome of the POAHDL-MDC method on 80% of TR set and 20% of TS set.
Table 2. Classifier outcome of the POAHDL-MDC method on 80% of TR set and 20% of TS set.
Class A c c u y P r e c n S e n s y S p e c y F s c o r e
Training Phase (80%)
Benign98.7199.0199.0398.0999.02
Defacement98.9196.2896.3699.3596.32
Phishing99.2597.0797.7599.5097.41
Malware Link98.9790.6388.3199.5289.45
Average98.9695.7595.3699.1295.55
Testing Phase (20%)
Benign98.7399.0399.0398.1699.03
Defacement98.8996.1796.4199.3396.29
Phishing99.2196.7397.8199.4497.26
Malware Link98.9391.2087.7399.5489.43
Average98.9495.7895.2499.1295.50
Table 3. Classifier result of the POAHDL-MDC model on 70% of the TR set and 30% of the TS set.
Table 3. Classifier result of the POAHDL-MDC model on 70% of the TR set and 30% of the TS set.
Class A c c u y P r e c n S e n s y S p e c y F s c o r e
Training Phase (70%)
Benign99.0299.4599.0698.9499.25
Defacement99.3398.0497.4299.6697.73
Phishing99.2796.7698.2699.4497.50
Malware Link99.5193.9396.3099.6795.10
Average99.2897.0497.7699.4397.40
Testing Phase (30%)
Benign99.0499.4699.0898.9799.27
Defacement99.3498.0797.5199.6697.79
Phishing99.3296.8498.4899.4697.65
Malware Link99.5394.4996.2099.7095.34
Average99.3197.2197.8299.4597.51
Table 4. Comparative outcome of the POAHDL-MDC methodology with other systems [17].
Table 4. Comparative outcome of the POAHDL-MDC methodology with other systems [17].
Methods A c c u y S e n s y S p e c y F s c o r e
POAHDL-MDC99.3197.8299.4597.51
Sequential DL98.5897.3298.8096.96
Naïve Bayes98.3394.7197.7594.54
Logistic Reg.95.2296.6698.0895.75
Decision Tree98.4095.0695.2494.13
Random Forest95.3397.3195.2396.56
Conv. NN98.9296.9897.5394.66
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Aljebreen, M.; Alrayes, F.S.; Aljameel, S.S.; Saeed, M.K. Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model. Sustainability 2023, 15, 16811. https://doi.org/10.3390/su152416811

AMA Style

Aljebreen M, Alrayes FS, Aljameel SS, Saeed MK. Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model. Sustainability. 2023; 15(24):16811. https://doi.org/10.3390/su152416811

Chicago/Turabian Style

Aljebreen, Mohammed, Fatma S. Alrayes, Sumayh S. Aljameel, and Muhammad Kashif Saeed. 2023. "Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model" Sustainability 15, no. 24: 16811. https://doi.org/10.3390/su152416811

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop