Skip to main content

Malicious Webpage Classification Using Deep Learning Technique

  • Conference paper
  • First Online:
Artificial Intelligence and Sustainable Computing

Abstract

There has been a sudden rapid increase in the number of malicious webpages in the recent years, so the process of determining the authenticity of a web link has become very difficult. Malicious webpage developers have been able to evade the signature-based detection techniques very easily and comfortably. The malicious webpage can be detected through basically static and dynamic analysis. In this paper, dynamic deep learning techniques have been explored that convert the links of the webpages to an image file and classifies the web pages as malicious or benign. The deep learning techniques (VGG 16 and VGG 19) are utilized for the classification of web pages. These models provide an accuracy of 99.8% in classifying malware webpage image file samples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sanou B (2016) ICT: facts and Figures. http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2016.pdf

  2. Ollmann G (2008) The Evolution of commercial malware development kits and colour-by-numbers custom malware. Comput Fraud Secur 2008(9):4–7

    Article  Google Scholar 

  3. Kaspersky (2014) Cybercrime, Inc.: how profitable is the business? URL: https://blog.kaspersky.com/cybercrime-inc-how-profitable-is-the-business/15034/

  4. Choi H, Zhu BB, Lee F (2012) Detecting malicious web links and identifying their attack types. In: 2nd proceedings of USENIX conference on Web application development. Berkeley: USENIX Association, CA, USA, pp 11–11

    Google Scholar 

  5. Canali D, Cova M, Prophiler GV (2011) A fast filter for the large-scale detection of malicious web pages. In: 20th proceedings of the international conference on World Wide Web. ACM, New York, USA, pp 197–206

    Google Scholar 

  6. Kumar R, Zhang X, Ahmad Tariq H, Khan RU (2017) Malicious URL detection using multi-layer filtering model. In: International computer conference on wavelet active media technology and information processing

    Google Scholar 

  7. Chipman HA, George EI, McCulloch RE (1998) Bayesian CART Model Search. J Am Stat Assoc 93(443):935–948

    Article  Google Scholar 

  8. Steinberg D, Colla P (2009) CART: classification and regression trees. The top ten algorithms in data mining, pp 179–201

    Google Scholar 

  9. Yue T, Sun J, Chen H (2013) Fine-grained mining and classification of malicious web pages. In: 4th International conference on digital manufacturing & automation

    Google Scholar 

  10. Kazemian HB, Ahmed S (2011) Comparisons of machine learning techniques for detecting malicious webpages. Expert Syst Appl 42(3):1166–1177

    Article  Google Scholar 

  11. Kabanga EK, Kim CH (2018) Malware images classification using convolution neural network. J Comput Commun 6:153–158

    Article  Google Scholar 

  12. Nguyen A, Yosinki J, Clune J (2015) Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. IEEE Comput Vision Pattern Recog (CVPR)

    Google Scholar 

  13. Wang X, Liu J, Chen X (2015) first place team: say no to over fitting. Winner of microsoft malware classification challenge

    Google Scholar 

  14. Abdi FD, Wenjuan L (2017) Malicious URL detection using convolution neural network. Int J Comput Sci Eng Inf Technol (IJCSEIT) 7(6)

    Google Scholar 

  15. Wang Y, Cai WD, Wei PC (2016) A deep learning approach for detecting malicious javascript code. Secur Commun Netw 9(11)

    Google Scholar 

  16. Xu L, Zhan Z, Xu S, Ye K (2013) Cross-layer detection of malicious websites. In: 3rd proceedings of ACM conference on Data and application security and privacy, pp 141–152

    Google Scholar 

  17. Shibahara T, Yamanishi K, Takata Y, Chiba D, Akiyama M, Yagi T, Ohsita Y, Murata M (2017) Malicious URL sequence detection using event de-noising convolutional neural network. In: ICC 2017 IEEE international conference on communications, pp 1–7

    Google Scholar 

  18. Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS. In: 19th proceedings of USENIX security symposium, pp 273–290

    Google Scholar 

  19. Tanner MA, Wong WH (1987) The calculation of posterior distributions by data augmentation. J Am Stat Assoc 82(398):528–540

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna, K., Choudhary, J., Singh, D.P. (2022). Malicious Webpage Classification Using Deep Learning Technique. In: Dubey, H.M., Pandit, M., Srivastava, L., Panigrahi, B.K. (eds) Artificial Intelligence and Sustainable Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-1220-6_39

Download citation

Publish with us

Policies and ethics