amahdaouy commited on
Commit
086d292
·
verified ·
1 Parent(s): 0341895

update readme

Browse files
Files changed (1) hide show
  1. README.md +7 -10
README.md CHANGED
@@ -58,23 +58,20 @@ The dataset URLs and Domain Names are collected from the following sources:
58
  Detecting and classifying suspicious or malicious domain names and URLs is fundamental task in cybersecurity. To leverage such indicators of compromise, cybersecurity vendors and practitioners often maintain and update blacklists of known malicious domains and URLs. However, blacklists frequently fail to identify emerging and obfuscated threats. Over the past few decades, there has been significant interest in developing machine learning models that automatically detect malicious domains and URLs, addressing the limitations of blacklists maintenance and updates. In this paper, we introduce DomURLs_BERT, a pre-trained BERT-based encoder adapted for detecting and classifying suspicious/malicious domains and URLs. DomURLs_BERT is pre-trained using the Masked Language Modeling (MLM) objective on a large multilingual corpus of URLs, domain names, and Domain Generation Algorithms (DGA) dataset. In order to assess the performance of DomURLs_BERT, we have conducted experiments on several binary and multi-class classification tasks involving domain names and URLs, covering phishing, malware, DGA, and DNS tunneling. The evaluations results show that the proposed encoder outperforms state-of-the-art character-based deep learning models and cybersecurity-focused BERT models across multiple tasks and datasets. The pre-training dataset, the pre-trained DomURLs_BERT encoder, and the experiments source code are publicly available.
59
  ## Citation
60
 
61
- to be updated
62
-
63
  ```bibtex
64
  @article{domurlsbert2024,
65
  title={{DomURLs\_BERT}: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification},
66
  author={Abdelkader El Mahdaouy and Salima Lamsiyah and Meryem Janati Idrissi and Hamza Alami and Zakaria Yartaoui and Ismail Berrada},
67
- journal={arXiv preprint arXiv:},
68
- eprint={},
69
- eprinttype = {arXiv},
70
- url={https://arxiv.org/abs/},
71
- year={2024},
72
- abstract:{
73
- Detecting and classifying suspicious or malicious domain names and URLs is fundamental task in cybersecurity. To leverage such indicators of compromise, cybersecurity vendors and practitioners often maintain and update blacklists of known malicious domains and URLs. However, blacklists frequently fail to identify emerging and obfuscated threats. Over the past few decades, there has been significant interest in developing machine learning models that automatically detect malicious domains and URLs, addressing the limitations of blacklists maintenance and updates. In this paper, we introduce DomURLs_BERT, a pre-trained BERT-based encoder adapted for detecting and classifying suspicious/malicious domains and URLs. DomURLs_BERT is pre-trained using the Masked Language Modeling (MLM) objective on a large multilingual corpus of URLs, domain names, and Domain Generation Algorithms (DGA) dataset. In order to assess the performance of DomURLs_BERT, we have conducted experiments on several binary and multi-class classification tasks involving domain names and URLs, covering phishing, malware, DGA, and DNS tunneling. The evaluations results show that the proposed encoder outperforms state-of-the-art character-based deep learning models and cybersecurity-focused BERT models across multiple tasks and datasets. The pre-training dataset, the pre-trained DomURLs_BERT encoder, and the experiments source code are publicly available.
74
- }
75
  }
76
  ```
77
 
 
78
  Please cite the following papers also when using the dataset:
79
 
80
  ```bibtex
 
58
  Detecting and classifying suspicious or malicious domain names and URLs is fundamental task in cybersecurity. To leverage such indicators of compromise, cybersecurity vendors and practitioners often maintain and update blacklists of known malicious domains and URLs. However, blacklists frequently fail to identify emerging and obfuscated threats. Over the past few decades, there has been significant interest in developing machine learning models that automatically detect malicious domains and URLs, addressing the limitations of blacklists maintenance and updates. In this paper, we introduce DomURLs_BERT, a pre-trained BERT-based encoder adapted for detecting and classifying suspicious/malicious domains and URLs. DomURLs_BERT is pre-trained using the Masked Language Modeling (MLM) objective on a large multilingual corpus of URLs, domain names, and Domain Generation Algorithms (DGA) dataset. In order to assess the performance of DomURLs_BERT, we have conducted experiments on several binary and multi-class classification tasks involving domain names and URLs, covering phishing, malware, DGA, and DNS tunneling. The evaluations results show that the proposed encoder outperforms state-of-the-art character-based deep learning models and cybersecurity-focused BERT models across multiple tasks and datasets. The pre-training dataset, the pre-trained DomURLs_BERT encoder, and the experiments source code are publicly available.
59
  ## Citation
60
 
 
 
61
  ```bibtex
62
  @article{domurlsbert2024,
63
  title={{DomURLs\_BERT}: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification},
64
  author={Abdelkader El Mahdaouy and Salima Lamsiyah and Meryem Janati Idrissi and Hamza Alami and Zakaria Yartaoui and Ismail Berrada},
65
+ journal={arXiv preprint arXiv:2409.09143},
66
+ year={2024},
67
+ eprint={2409.09143},
68
+ archivePrefix={arXiv},
69
+ primaryClass={cs.CR},
70
+ url={https://arxiv.org/abs/2409.09143},
 
 
71
  }
72
  ```
73
 
74
+
75
  Please cite the following papers also when using the dataset:
76
 
77
  ```bibtex