{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T17:23:18Z","timestamp":1764004998707,"version":"3.45.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Universit\u00e0 del Salento"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:sec>\n                    <jats:title>\n                      <jats:bold>Purpose:<\/jats:bold>\n                    <\/jats:title>\n                    <jats:p>With technological advancements, uniform resource locators (URLs) are increasingly used in healthcare to store patient records, reducing paperwork. However, security concerns arise as malicious URLs can deceive users, leading to data breaches. Machine learning (ML) offers a solution by analyzing past data to predict whether a URL is malicious or benign.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>\n                      <jats:bold>Methods:<\/jats:bold>\n                    <\/jats:title>\n                    <jats:p>In this work, a dataset from GitHub containing 151,828 URL samples was pre-processed, revealing unique characteristics of malicious URLs. Ad hoc feature extraction techniques were applied to capture these distinguishing traits. To classify URLs, various supervised ML classifiers were used, including logistic regression (LR), perceptron, decision tree (DT), random forest (RF), extreme gradient boosting (XGBoost), adaptive boosting (AdaBoost), gradient boost (GB), k-nearest neighbors (KNN), support vector machine (SVM), cat boost (CB), multinomial naive bayes (MNB), bernoulli baive bayes (BNB), light gradient boosting (LGBM) and passive aggressive classifier (PAC). Additionally, \u201cautomatic\u201d feature extraction was performed using the term frequency-inverted document frequency (TF-IDF) method and the extracted features were then used with models such as LR, DT, RF, XGBoost, CB, KNN, LGBM, PAC, MNB, and BNB.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>\n                      <jats:bold>Results:<\/jats:bold>\n                    <\/jats:title>\n                    <jats:p>Experimental results demonstrate that automatic feature extraction improves classification accuracy, making it a reliable method for detecting malicious URLs. The RF classifier had the best performance with both methods, achieving 99.82% accuracy with automatic feature extraction compared to 99.57% with hand-crafted features. The other metrics also improved with automatic feature extraction, including 99.84% precision, 99.44% recall, and 99.64% F1 score.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>\n                      <jats:bold>Conclusion:<\/jats:bold>\n                    <\/jats:title>\n                    <jats:p>This approach has potential applications in securing healthcare systems, web browsers, and cybersecurity platforms, helping prevent unauthorized access to sensitive information.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1007\/s11416-025-00579-9","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:42:47Z","timestamp":1760722967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing healthcare systems: a random forest approach to malicious URL detection"],"prefix":"10.1007","volume":"21","author":[{"given":"Anuja","family":"Nair","sequence":"first","affiliation":[]},{"given":"Pal","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Vadher","sequence":"additional","affiliation":[]},{"given":"Man","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Tarjni","family":"Vyas","sequence":"additional","affiliation":[]},{"given":"Chintan","family":"Bhatt","sequence":"additional","affiliation":[]},{"given":"Luana","family":"Conte","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"De Nunzio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"579_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.33889\/IJMEMS.2019.4.1-002","volume":"4","author":"L Wang","year":"2019","unstructured":"Wang, L., Alexander, C.: Big data analytics in healthcare systems. Int. J. Math. Eng. Manage. Sci. 4, 17\u201326 (2019). https:\/\/doi.org\/10.33889\/IJMEMS.2019.4.1-002","journal-title":"Int. J. Math. Eng. Manage. Sci."},{"key":"579_CR2","doi-asserted-by":"publisher","unstructured":"Dutta Pramanik, P., Pal, S., Mukherjee, M.: Healthcare big data: a comprehensive overview, 72\u2013100 (2018). https:\/\/doi.org\/10.4018\/978-1-5225-7071-4.ch004","DOI":"10.4018\/978-1-5225-7071-4.ch004"},{"key":"579_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2022.100872","volume":"29","author":"AK Jabali","year":"2022","unstructured":"Jabali, A.K., Waris, A., Khan, D.I., Ahmed, S., Hourani, R.J.: Electronic health records: three decades of bibliometric research productivity analysis and some insights. Inform. Med. Unlocked 29, 100872 (2022). https:\/\/doi.org\/10.1016\/j.imu.2022.100872","journal-title":"Inform. Med. Unlocked"},{"key":"579_CR4","doi-asserted-by":"publisher","unstructured":"Upadhyay, S., Hu, H.-f.: A qualitative analysis of the impact of electronic health records (ehr) on healthcare quality and safety: Clinicians\u2019 lived experiences. Health Services Insights 15, 11786329211070722 (2022) https:\/\/doi.org\/10.1177\/11786329211070722. PMID: 35273449","DOI":"10.1177\/11786329211070722"},{"issue":"2","key":"579_CR5","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2020.07.003","volume":"22","author":"I Keshta","year":"2021","unstructured":"Keshta, I., Odeh, A.: Security and privacy of electronic health records: concerns and challenges. Egypt. Inform. J. 22(2), 177\u2013183 (2021). https:\/\/doi.org\/10.1016\/j.eij.2020.07.003","journal-title":"Egypt. Inform. J."},{"key":"579_CR6","doi-asserted-by":"publisher","first-page":"104127","DOI":"10.1109\/ACCESS.2021.3098708","volume":"9","author":"A Sahi","year":"2021","unstructured":"Sahi, A., Lai, D., Li, Y.: A review of the state of the art in privacy and security in the ehealth cloud. IEEE Access 9, 104127\u2013104141 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3098708","journal-title":"IEEE Access"},{"key":"579_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.011","author":"B Y\u00fcksel","year":"2016","unstructured":"Y\u00fcksel, B., K\u00fcp\u00e7\u00fc, A., Ozkasap, O.: Research issues for privacy and security of electronic health services. Future Generat. Comput. Syst. (2016). https:\/\/doi.org\/10.1016\/j.future.2016.08.011","journal-title":"Future Generat. Comput. Syst."},{"key":"579_CR8","doi-asserted-by":"publisher","unstructured":"Alkanhel, R., El-kenawy, E.-S.M., A.\u00a0Abdelhamid, A., Ibrahim, A., Alohali, M.A., Abotaleb, M., Khafaga, D.S.: Network intrusion detection based on feature selection and hybrid metaheuristic optimization. Computers, Materials & Continua 74(2), 2677\u20132693 (2023) https:\/\/doi.org\/10.32604\/cmc.2023.033273","DOI":"10.32604\/cmc.2023.033273"},{"key":"579_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/s22093373","author":"M Alsaedi","year":"2022","unstructured":"Alsaedi, M., Ghaleb, F.A., Saeed, F., Ahmad, J., Alasli, M.: Cyber threat intelligence-based malicious url detection model using ensemble learning. Sensors (2022). https:\/\/doi.org\/10.3390\/s22093373","journal-title":"Sensors"},{"key":"579_CR10","doi-asserted-by":"publisher","unstructured":"ALfouzan, N.A., C, N.: A systematic approach for malware url recognition. In: 2022 2nd international conference on computing and information technology (ICCIT), pp. 325\u2013329 (2022). https:\/\/doi.org\/10.1109\/ICCIT52419.2022.9711614","DOI":"10.1109\/ICCIT52419.2022.9711614"},{"key":"579_CR11","doi-asserted-by":"publisher","first-page":"42949","DOI":"10.1109\/ACCESS.2022.3168681","volume":"10","author":"M S\u00e1nchez-Paniagua","year":"2022","unstructured":"S\u00e1nchez-Paniagua, M., Fern\u00e1ndez, E.F., Alegre, E., Al-Nabki, W., Gonz\u00e1lez-Castro, V.: Phishing url detection: a real-case scenario through login urls. IEEE Access 10, 42949\u201342960 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3168681","journal-title":"IEEE Access"},{"issue":"2","key":"579_CR12","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TDSC.2021.3121388","volume":"19","author":"Y Liang","year":"2022","unstructured":"Liang, Y., Wang, Q., Xiong, K., Zheng, X., Yu, Z., Zeng, D.: Robust detection of malicious urls with self-paced wide & deep learning. IEEE Trans. Dependable Secure Comput. 19(2), 717\u2013730 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3121388","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"579_CR13","doi-asserted-by":"publisher","first-page":"9464","DOI":"10.1109\/ACCESS.2021.3049625","volume":"9","author":"J Yuan","year":"2021","unstructured":"Yuan, J., Chen, G., Tian, S., Pei, X.: Malicious url detection based on a parallel neural joint model. IEEE Access 9, 9464\u20139472 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3049625","journal-title":"IEEE Access"},{"key":"579_CR14","doi-asserted-by":"publisher","unstructured":"Wejinya, G., Bhatia, S.: Machine Learning for Malicious URL Detection, 463\u2013472 (2021). https:\/\/doi.org\/10.1007\/978-981-15-8289-9_45","DOI":"10.1007\/978-981-15-8289-9_45"},{"key":"579_CR15","doi-asserted-by":"publisher","unstructured":"Yunusa, A.M.: Detection of malicious url using machine learning: a review (2023) https:\/\/doi.org\/10.13140\/RG.2.2.11778.86729","DOI":"10.13140\/RG.2.2.11778.86729"},{"key":"579_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.46338\/ijetae1121_08","volume":"11","author":"N Lam","year":"2021","unstructured":"Lam, N.: Developing a framework for detecting phishing urls using machine learning. Int. J. Emerg. Technol. Adv. Eng. 11, 61\u201367 (2021). https:\/\/doi.org\/10.46338\/ijetae1121_08","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"579_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122147","volume":"238","author":"E-SM El-kenawy","year":"2024","unstructured":"El-kenawy, E.-S.M., Khodadadi, N., Mirjalili, S., Abdelhamid, A.A., Eid, M.M., Ibrahim, A.: Greylag goose optimization: nature-inspired optimization algorithm. Expert Syst. Appl. 238, 122147 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.122147","journal-title":"Expert Syst. Appl."},{"key":"579_CR18","doi-asserted-by":"crossref","unstructured":"Alsaedi, M., Ghaleb, F.A., Saeed, F., Ahmad, J., Alasli, M.: Cyber threat intelligence-based malicious url detection model using ensemble learning. Sensors 22(9) (2022)","DOI":"10.3390\/s22093373"},{"key":"579_CR19","doi-asserted-by":"publisher","unstructured":"Chiramdasu, R., Srivastava, G., Bhattacharya, S., Reddy, P.K., Reddy\u00a0Gadekallu, T.: Malicious url detection using logistic regression. In: 2021 IEEE International conference on Omni-Layer intelligent systems (COINS), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/COINS51742.2021.9524269","DOI":"10.1109\/COINS51742.2021.9524269"},{"key":"579_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/axioms12050458","author":"AA Wagan","year":"2023","unstructured":"Wagan, A.A., Li, Q., Zaland, Z., Marjan, S., Bozdar, D.K., Hussain, A., Mirza, A.M., Baryalai, M.: A unified learning approach for malicious domain name detection. Axioms (2023). https:\/\/doi.org\/10.3390\/axioms12050458","journal-title":"Axioms"},{"key":"579_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comcom.2021.04.023","volume":"175","author":"BB Gupta","year":"2021","unstructured":"Gupta, B.B., Yadav, K., Razzak, I., Psannis, K., Castiglione, A., Chang, X.: A novel approach for phishing urls detection using lexical based machine learning in a real-time environment. Comput. Commun. 175, 47\u201357 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.04.023","journal-title":"Comput. Commun."},{"key":"579_CR22","doi-asserted-by":"publisher","DOI":"10.3390\/s23187760","author":"S Abad","year":"2023","unstructured":"Abad, S., Gholamy, H., Aslani, M.: Classification of malicious urls using machine learning. Sensors (2023). https:\/\/doi.org\/10.3390\/s23187760","journal-title":"Sensors"},{"key":"579_CR23","doi-asserted-by":"publisher","unstructured":"Myriam, H., A.\u00a0Abdelhamid, A., El-Kenawy, E.-S.M., Ibrahim, A., Eid, M.M., Jamjoom, M.M., Khafaga, D.S.: Advanced meta-heuristic algorithm based on particle swarm and al-biruni earth radius optimization methods for oral cancer detection. IEEE Access 11, 23681\u201323700 (2023) https:\/\/doi.org\/10.1109\/ACCESS.2023.3253430","DOI":"10.1109\/ACCESS.2023.3253430"},{"issue":"10","key":"579_CR24","doi-asserted-by":"publisher","first-page":"6673","DOI":"10.1109\/TII.2020.2977886","volume":"16","author":"X Yan","year":"2020","unstructured":"Yan, X., Xu, Y., Cui, B., Zhang, S., Guo, T., Li, C.: Learning url embedding for malicious website detection. IEEE Trans. Industr. Inf. 16(10), 6673\u20136681 (2020). https:\/\/doi.org\/10.1109\/TII.2020.2977886","journal-title":"IEEE Trans. Industr. Inf."},{"key":"579_CR25","doi-asserted-by":"publisher","unstructured":"Manyumwa, T., Chapita, P.F., Wu, H., Ji, S.: Towards fighting cybercrime: Malicious url attack type detection using multiclass classification. In: 2020 IEEE international conference on big data (Big Data), pp. 1813\u20131822 (2020). https:\/\/doi.org\/10.1109\/BigData50022.2020.9378029","DOI":"10.1109\/BigData50022.2020.9378029"},{"key":"579_CR26","doi-asserted-by":"publisher","unstructured":"Nowroozi, E., -, A., Mohammadi, M., Conti, M.: Pristine and malicious urls (2022) https:\/\/doi.org\/10.21227\/2ph5-xc09","DOI":"10.21227\/2ph5-xc09"},{"key":"579_CR27","doi-asserted-by":"crossref","unstructured":"Computer Science and Intelligent Systems Research Center, Blacksburg 24060, Virginia, USA, Khaled, K., Department of Interdisciplinary Courses in Engineering, Chitkara University Institute of Engineering Technology, Chitkara University, Punjab, India, Singla, M.K.: Predictive analysis of groundwater resources using random forest regression. Journal of Artificial Intelligence and Metaheuristics 09(01), 11\u201319 (2025)","DOI":"10.54216\/JAIM.090102"},{"key":"579_CR28","doi-asserted-by":"publisher","unstructured":"Nowroozi, E., Abhishek, Mohammadi, M., Conti, M.: An adversarial attack analysis on malicious advertisement url detection framework. IEEE Transactions on Network and Service Management 20(2), 1332\u20131344 (2023) https:\/\/doi.org\/10.1109\/TNSM.2022.3225217","DOI":"10.1109\/TNSM.2022.3225217"},{"key":"579_CR29","unstructured":"Maftoun, M., Shadkam, N., Komamardakhi, S.S.S., Mansor, Z., Joloudari, J.H.: Malicious URL Detection using optimized Hist Gradient Boosting Classifier based on grid search method (2024). arxiv:abs\/2406.10286"},{"key":"579_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-024-03700-w","author":"N Reyes-Dorta","year":"2024","unstructured":"Reyes-Dorta, N., Caballero-Gil, P., Rosa-Remedios, C.: Detection of malicious urls using machine learning. Springer (2024). https:\/\/doi.org\/10.1007\/s11276-024-03700-w","journal-title":"Springer"},{"key":"579_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/s23187760","author":"S Abad","year":"2023","unstructured":"Abad, S., Gholamy, H., Aslani, M.: Classification of malicious urls using machine learning. Sensors (2023). https:\/\/doi.org\/10.3390\/s23187760","journal-title":"Sensors"},{"key":"579_CR32","doi-asserted-by":"publisher","first-page":"92523","DOI":"10.1109\/ACCESS.2023.3291811","volume":"11","author":"AS Rafsanjani","year":"2023","unstructured":"Rafsanjani, A.S., Kamaruddin, N.B., Rusli, H.M., Dabbagh, M.: Qsecr: secure qr code scanner according to a novel malicious url detection framework. IEEE Access 11, 92523\u201392539 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3291811","journal-title":"IEEE Access"},{"key":"579_CR33","doi-asserted-by":"publisher","first-page":"93089","DOI":"10.1109\/ACCESS.2021.3093094","volume":"9","author":"S He","year":"2021","unstructured":"He, S., Li, B., Peng, H., Xin, J., Zhang, E.: An effective cost-sensitive xgboost method for malicious urls detection in imbalanced dataset. IEEE Access 9, 93089\u201393096 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3093094","journal-title":"IEEE Access"},{"key":"579_CR34","doi-asserted-by":"publisher","first-page":"150142","DOI":"10.1109\/ACCESS.2021.3124628","volume":"9","author":"PL Indrasiri","year":"2021","unstructured":"Indrasiri, P.L., Halgamuge, M.N., Mohammad, A.: Robust ensemble machine learning model for filtering phishing urls: expandable random gradient stacked voting classifier (erg-svc). IEEE Access 9, 150142\u2013150161 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3124628","journal-title":"IEEE Access"},{"key":"579_CR35","doi-asserted-by":"publisher","unstructured":"Kumar, J., Santhanavijayan, A., Janet, B., Rajendran, B., Bindhumadhava, B.S.: Phishing website classification and detection using machine learning. In: 2020 international conference on computer communication and informatics (ICCCI), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICCCI48352.2020.9104161","DOI":"10.1109\/ICCCI48352.2020.9104161"},{"key":"579_CR36","doi-asserted-by":"crossref","unstructured":"Computer Science and Intelligent Systems Research Center, Blacksburg 24060, Virginia, USA, Mahmoud, M.: A review on waste management techniques for sustainable energy production. Metaheuristic Optimization Review 3(2), 47\u201358 (2025)","DOI":"10.54216\/MOR.030205"},{"key":"579_CR37","doi-asserted-by":"publisher","unstructured":"Prasad, A., Chandra, S.: PhiUSIIL Phishing URL (Website). UCI Machine Learning Repository. https:\/\/doi.org\/10.1016\/j.cose.2023.103545 (2024)","DOI":"10.1016\/j.cose.2023.103545"},{"key":"579_CR38","unstructured":"Malicious URLs dataset \u2014 kaggle.com. https:\/\/www.kaggle.com\/datasets\/sid321axn\/malicious-urls-dataset. [Accessed 02-04-2025]"},{"key":"579_CR39","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00579-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-025-00579-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00579-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T17:20:34Z","timestamp":1764004834000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-025-00579-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["579"],"URL":"https:\/\/doi.org\/10.1007\/s11416-025-00579-9","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"11 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"34"}}