{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:45:38Z","timestamp":1773931538482,"version":"3.50.1"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Lab of Information Network Security, Ministry of Public Security","award":["C19614"],"award-info":[{"award-number":["C19614"]}]},{"name":"Key Lab of Information Network Security, Ministry of Public Security","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}]},{"name":"Key Lab of Information Network Security, Ministry of Public Security","award":["3201012"],"award-info":[{"award-number":["3201012"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["C19614"],"award-info":[{"award-number":["C19614"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["3201012"],"award-info":[{"award-number":["3201012"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute","award":["C19614"],"award-info":[{"award-number":["C19614"]}]},{"name":"First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}]},{"name":"First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute","award":["3201012"],"award-info":[{"award-number":["3201012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,15]]},"abstract":"<jats:p>With the development of Internet technology, network security is under diverse threats. In particular, attackers can spread malicious uniform resource locators (URL) to carry out attacks such as phishing and spam. The research on malicious URL detection is significant for defending against these attacks. However, there are still some problems in the current research. For instance, malicious features cannot be extracted efficiently. Some existing detection methods are easy to evade by attackers. We design a malicious URL detection model based on a dynamic convolutional neural network (DCNN) to solve these problems. A new folding layer is added to the original multilayer convolution network. It replaces the pooling layer with the k-max-pooling layer. In the dynamic convolution algorithm, the width of feature mapping in the middle layer depends on the vector input dimension. Moreover, the pooling layer parameters are dynamically adjusted according to the length of the URL input and the depth of the current convolution layer, which is beneficial to extracting more in-depth features in a wider range. In this paper, we propose a new embedding method in which word embedding based on character embedding is leveraged to learn the vector representation of a URL. Meanwhile, we conduct two groups of comparative experiments. First, we conduct three contrast experiments, which adopt the same network structure and different embedding methods. The results prove that word embedding based on character embedding can achieve higher accuracy. We then conduct the other three experiences, which use the same embedding method proposed in this paper and use different network structures to determine which network is most suitable for our model. We verify that the model designed in this paper has the highest accuracy (98%) in detecting malicious URL through these experiences.<\/jats:p>","DOI":"10.1155\/2021\/5518528","type":"journal-article","created":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T19:50:06Z","timestamp":1621108206000},"page":"1-12","source":"Crossref","is-referenced-by-count":18,"title":["A Malicious URL Detection Model Based on Convolutional Neural Network"],"prefix":"10.1155","volume":"2021","author":[{"given":"Zhiqiang","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100071, China"},{"name":"State Information Center, Beijing 100032, China"},{"name":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China"}]},{"given":"Xiaorui","family":"Ren","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100071, China"}]},{"given":"Shuhao","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100071, China"}]},{"given":"Bingyan","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8765-053X","authenticated-orcid":true,"given":"Jianyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100071, China"}]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China"}]}],"member":"311","reference":[{"issue":"1","key":"1","first-page":"38","article-title":"Examining the relationship between threat and coping appraisal in phishing detection among college students","volume":"10","author":"D. J. Lemay","year":"2020","journal-title":"Journal of Internet Services and Information Security"},{"issue":"2","key":"2","first-page":"1","article-title":"5G core network security issues and attack classification from network protocol perspective","volume":"10","author":"H. Kim","year":"2020","journal-title":"Journal of Internet Services and Information Security"},{"issue":"4","key":"3","first-page":"46","article-title":"A systematic review of insider threat detection","volume":"10","author":"K. Aram","year":"2019","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"issue":"4","key":"4","first-page":"1","article-title":"Towards detecting and classifying network intrusion traffic using deep learning frameworks","volume":"9","author":"R. B. Basnet","year":"2019","journal-title":"Journal of Internet Services and Information Security"},{"key":"5","first-page":"22","article-title":"An optimized firewall anomaly resolution","volume":"10","author":"F. Valenza","year":"2020","journal-title":"Journal of Internet Services and Information Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.14257\/ijunesst.2015.8.5.18"},{"key":"7","first-page":"1","article-title":"Character level based detection of DGA domain names","author":"B. Yu"},{"key":"8","first-page":"640","article-title":"Algorithmically generated domain detection and malware family classification","author":"C. Choudhary"},{"key":"9","doi-asserted-by":"crossref","article-title":"A framework for detection and measurement of phishing attacks","author":"S. Garera","DOI":"10.1145\/1314389.1314391"},{"key":"10","article-title":"Behind phishing: an examination of phisher modi operandi","author":"D. K. M. M. Gupta"},{"key":"11","article-title":"Beyond blacklists: learning to detect malicious Web sites from suspicious URL","author":"J. Ma"},{"key":"12","article-title":"Detecting malicious web links and identifying their attack types","author":"H. Choi"},{"key":"13","first-page":"807","article-title":"Optimized invariant representation of network traffic for detecting unseen malware variants","author":"K. Bartos"},{"key":"14","volume-title":"Deep Learning","author":"I. Goodfellow","year":"2016"},{"key":"15","first-page":"5","article-title":"Classification for DGA-based malicious domain names with deep learning architectures","author":"Z. Feng"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.015"},{"key":"17","article-title":"Convolutional neural networks for sentence classification","author":"K. Yoon","year":"2014"},{"key":"18","article-title":"Character-level convolutional networks for text classification","author":"X. Zhang","year":"2015"},{"issue":"4","key":"19","first-page":"31","article-title":"Towards detecting and classifying malicious url using deep learning","volume":"11","author":"J. Clayton","year":"2020","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"key":"20","volume-title":"Research and Design of Malicious URL Detection Algorithm on Deep Learning","author":"Z. U. O. Wen","year":"2019"},{"key":"21","first-page":"143","article-title":"Multi-classification for malicious URL based on improved semi-supervised algorithm","author":"J. Yang"},{"key":"22","first-page":"1","article-title":"Malicious URL sequence detection using event de-noising convolutional neural network","author":"T. Shibahara"},{"key":"23","article-title":"Predicting domain generation algorithms with long short-term memory networks","author":"J. Woodbridge","year":"2016"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/P16-2044","article-title":"Tweet2Vec: character-based distributed representations for social media","author":"B. Dhingra","year":"2016"},{"key":"25","first-page":"1041","article-title":"Tweet2vec: learning tweet embeddings using character-level CNN-LSTM encoder-decoder","author":"S. Vosoughi"},{"issue":"7","key":"26","first-page":"106","article-title":"A fast DGA domain algorithm based on deep learning","volume":"54","author":"Y. Liu","year":"2019","journal-title":"Journal of Shandong University(Natural Science)"},{"key":"27","article-title":"A deep learning method to detect web attacks using a specially designed CNN","author":"Z. Ming"},{"key":"28","article-title":"From throw-away traffic to bots: detecting the rise of DGA-based malware","author":"M. Antonakakis"},{"issue":"12","key":"29","first-page":"1","article-title":"Improved algorithm for detecting the malicious domain name based on the convolutional neural network","volume":"1","author":"Y. Lu","year":"2019","journal-title":"Journal of Xidian University"},{"key":"30","article-title":"eXpose: a character-level convolutional neural network with embeddings for detecting malicious url, file paths, and registry keys","author":"J. Saxe","year":"2017"},{"key":"31","doi-asserted-by":"crossref","article-title":"Phoenix: DGA-based botnet tracking and intelligence","author":"S. Schiavoni","DOI":"10.1007\/978-3-319-08509-8_11"},{"key":"32","first-page":"655","article-title":"A convolutional neural network for modeling sentences","author":"N. Kalchbrenner"},{"key":"33","article-title":"URLNet: learning a URL representation with deep learning for malicious URL","author":"L. Hung","year":"2018"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9666-7"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9031-3_3"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518528.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518528.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518528.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T19:50:25Z","timestamp":1621108225000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5518528\/"}},"subtitle":[],"editor":[{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,15]]},"references-count":35,"alternative-id":["5518528","5518528"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5518528","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,5,15]]}}}