PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network

November 21, 2023 ยท Entered Twilight ยท ๐Ÿ› Information Fusion

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: .idea, Data, LICENSE, Model_CharBERT.py, Model_PMA.py, README.md, Test_Multiple.py, Test_binary.py, Train.py, adverserial_generator.py, attention.py, bert_utils.py, character_bert_wiki, data_processing.py, data_utils.py

Authors Ruitong Liu, Yanbin Wang, Haitao Xu, Zhan Qin, Fan Zhang, Yiwei Liu, Zheng Cao arXiv ID 2311.12372 Category cs.CR: Cryptography & Security Citations 27 Venue Information Fusion Repository https://github.com/Alixyvtte/Malicious-URL-Detection-PMANet โญ 14 Last Checked 1 month ago
Abstract
The proliferation of malicious URLs has made their detection crucial for enhancing network security. While pre-trained language models offer promise, existing methods struggle with domain-specific adaptability, character-level information, and local-global encoding integration. To address these challenges, we propose PMANet, a pre-trained Language Model-Guided multi-level feature attention network. PMANet employs a post-training process with three self-supervised objectives: masked language modeling, noisy language modeling, and domain discrimination, effectively capturing subword and character-level information. It also includes a hierarchical representation module and a dynamic layer-wise attention mechanism for extracting features from low to high levels. Additionally, spatial pyramid pooling integrates local and global features. Experiments on diverse scenarios, including small-scale data, class imbalance, and adversarial attacks, demonstrate PMANet's superiority over state-of-the-art models, achieving a 0.9941 AUC and correctly detecting all 20 malicious URLs in a case study. Code and data are available at https://github.com/Alixyvtte/Malicious-URL-Detection-PMANet.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Cryptography & Security