Adaptive Machine Learning Strategies for Detecting Malicious URLs

Authors

  • hemendra sharma Shanker Assistant Professor, College of Smart Computing, COER University, Roorkee. Author

DOI:

https://doi.org/10.70454/JRICST.2026.30105

Keywords:

Machine Learning, Phishing Detection, Malicious URL Classification, URL Feature Extraction, Cybersecurity

Abstract

The proliferation of online services has brought even greater exposure to cyber-attacks, especially in the form of phishing and malicious URL-based threats that impersonate legitimate websites to steal user credentials and financial data. Traditional blacklisting and rule-based security solutions are not able to keep up with the changing phishing tactics, posing a challenge for developing intelligent and adaptive detection solutions. Here, a holistic machine learning based framework for malicious URL classification using supervised learning models is being proposed. Four classifiers, namely K-Nearest Neighbor (KNN), Kernel Support Vector Machine (SVM), Decision Tree, Random Forest have been trained and tested on a comprehensive dataset which contains lexical, domain based and host based URL attributes. Model efficiency is improved using the preprocessing based on standardization and the automated feature extraction. A comparative analysis based on confusion matrices and accuracy indicates that Random Forest classifier gives the best results among other classifiers with highest accuracy of 96.82%. The results demonstrate that some method is more robust to different phishing scenarios. In this work, we present an efficient, scalable and low cost detection approach to facilitate real-time cyber security system, which constitutes a practical solution to enhancing online security against emerging malicious URL attacks.

Downloads

Download data is not yet available.

References

[1] G. R. Smith and J. Eckroth, “Building AI applications: Yesterday, today, and tomorrow,” AI Magazine, vol. 38, no. 1, pp. 6–22, Mar. 2017.

[2] P. Louridas and C. Ebert, “Machine learning,” IEEE Software, vol. 33, pp. 110–115, Sep. 2016.

[3] M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, vol. 349, pp. 255–260, Jul. 2015.

[4] S. Aftergood, “Cybersecurity: The cold war online,” Nature, vol. 547, p. 30, Jul. 2017.

[5] A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. Payne, “Evaluating computer intrusion detection systems: A survey of common practices,” ACM Computing Surveys, vol. 48, no. 12, pp. 1–37, Sep. 2015.

[6] C. N. Modi and K. Acha, “Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: A comprehensive review,” The Journal of Supercomputing, vol. 73, no. 3, pp. 1192–1234, Mar. 2017.

[7] E. Viegas et al., “Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems,” IEEE Transactions on Computers, vol. 66, pp. 1–11, Jan. 2016.

[8] F. Türk and M. Kılıçaslan, “Malicious URL detection with advanced machine learning and optimization-supported deep learning models,” Applied Sciences, vol. 15, p. 10090, 2025, doi: 10.3390/app151810090.

[9] E. Nazeeruddin, G. Latif, and N. Mohammad, “Malicious URL detection and categorization using machine learning techniques,” in Proc. 2024 IEEE 16th Int. Conf. Computational Intelligence and Communication Networks (CICN), Indore, India, 2024, pp. 676–682, doi: 10.1109/CICN63059.2024.10847544.

[10] Y. Y. Munaye, A. B. Workneh, Y. B. Chekol, and A. M. Mekonen, “Effective detection of malicious Uniform Resource Locator (URLs) using deep-learning techniques,” Algorithms, vol. 18, p. 355, 2025, doi: 10.3390/a18060355.

[11] S. Li and O. Dib, “Enhancing online security: A novel machine learning framework for robust detection of known and unknown malicious URLs,” J. Theor. Appl. Electron. Commer. Res., vol. 19, pp. 2919–2960, 2024, doi: 10.3390/jtaer19040141.

[12] B. Wang, “Malicious URL detection with explainable machine learning techniques,” in Proc. 2025 2nd Int. Conf. Informatics Education and Computer Technology Applications (IECA ’25), New York, NY, USA, 2025, pp. 293–299, doi: 10.1145/3732801.3732854.

[13] S. Mohanty and A. A. Acharya, “Detection of cyber attacks from malicious URLs using ensemble machine learning techniques,” in Intelligent Technologies, S. Das, C. Pradhan, S. Bhatia Khan, and K. Ching Li, Eds., vol. 1212, Singapore: Springer, 2025, doi: 10.1007/978-981-96-5585-4_3.

[14] Y. Zhao, Y. Chen, and R. Zhang, “Malicious website detection optimization in enterprise cybersecurity management: A machine learning-based decision support approach,” in Proc. 2025 2nd Int. Conf. Innovation Management and Information System (ICIIS ’25), New York, NY, USA, 2025, pp. 121–127, doi: 10.1145/3745676.3745695.

[15] A. I. A. Alzahrani, M. Ayadi, M. M. Asiri, A. Al-Rasheed, and A. Ksibi, “Detecting the presence of malware and identifying the type of cyber attack using deep learning and VGG-16 techniques,” Electronics, vol. 11, p. 3665, 2022, doi: 10.3390/electronics11223665.

Downloads

Published

2026-01-20

Issue

Section

Article

How to Cite

sharma Shanker, hemendra. (2026). Adaptive Machine Learning Strategies for Detecting Malicious URLs. Journal of Recent Innovations in Computer Science and Technology, 3(1), 52-63. https://doi.org/10.70454/JRICST.2026.30105

Similar Articles

1-10 of 19

You may also start an advanced similarity search for this article.