The goal of our research is to identify malicious advertisement URLs and to apply adversarial attack on ensembles. We extract lexical and web-scrapped features from using python code. And then 4 machine learning algorithms are applied for the classification process and then used the K-Means clustering for the visual understanding. We check the vulnerability of the models by the adversarial examples. We applied Zeroth Order Optimization adversarial attack on the models and compute the attack accuracy.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti, "Pristine and Malicious URLs", IEEE Dataport, 2022. [Online]. Available: http://dx.doi.org/10.21227/2ph5-xc09. Accessed: Dec. 26, 2024.
@data{2ph5-xc09-22,
doi = {10.21227/2ph5-xc09},
url = {http://dx.doi.org/10.21227/2ph5-xc09},
author = {Ehsan Nowroozi; Abhishek -; Mohammadreza Mohammadi; Mauro Conti },
publisher = {IEEE Dataport},
title = {Pristine and Malicious URLs},
year = {2022} }
TY - DATA
T1 - Pristine and Malicious URLs
AU - Ehsan Nowroozi; Abhishek -; Mohammadreza Mohammadi; Mauro Conti
PY - 2022
PB - IEEE Dataport
UR - 10.21227/2ph5-xc09
ER -
Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti. (2022). Pristine and Malicious URLs. IEEE Dataport. http://dx.doi.org/10.21227/2ph5-xc09
Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti, 2022. Pristine and Malicious URLs. Available at: http://dx.doi.org/10.21227/2ph5-xc09.
Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti. (2022). "Pristine and Malicious URLs." Web.
1. Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti. Pristine and Malicious URLs [Internet]. IEEE Dataport; 2022. Available from : http://dx.doi.org/10.21227/2ph5-xc09
Ehsan Nowroozi, Abhishek -, Mohammadreza Mohammadi, Mauro Conti. "Pristine and Malicious URLs." doi: 10.21227/2ph5-xc09