Enhance URL Defacement Attack Detection Using Particle Swarm Optimization and Machine Learning
Uniform resource locator (URL) defacement attack can be defined as any cyberattack in which the attacker replaces the appearance or content of the targeted webpage with their own that is intended to disgrace, mislead, or malign the website. Detecting URL defacement attacks is significant to avoid br...
Saved in:
| Published in | Journal of Computational and Cognitive Engineering |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
29.08.2025
|
| Online Access | Get full text |
| ISSN | 2810-9570 2810-9503 2810-9503 |
| DOI | 10.47852/bonviewJCCE52024668 |
Cover
| Abstract | Uniform resource locator (URL) defacement attack can be defined as any cyberattack in which the attacker replaces the appearance or content of the targeted webpage with their own that is intended to disgrace, mislead, or malign the website. Detecting URL defacement attacks is significant to avoid breaching the security of the website content or its configuration files, modifying the file locations, templates, or attacks on the website environment and applications. A machine learning (ML) technique can be used to detect the defacement attack on any website with complex content and structure, as opposed to the classical techniques for detection, such as Diff comparison, Document Object model tree analysis, and checksum, which can only be applied to static websites. This article proposes a feature selection model based on particle swarm optimization with support vector machine, decision tree, random forest, Naive Bayes, and k-nearest neighbor ML classification algorithms. The proposed model aims to improve the URL defacement attack detection by selecting the best features from the ISCX-URL-2016 dataset. Then, the reduced set of features produced by the proposed model step is used as input to evaluate and compare the results of the used ML classifiers. The results showed that the proposed model has significantly reduced the features, regarding the classification's feature reduction, the random forest classifier outperformed other classifiers in terms of true positive rates, accuracy, precision, sensitivity, and F-measure, whereas the proposed model with random forest classifier has 99.21% True positive rates, 99.29% accuracy rate, 99.38% precision rate, 99.21% sensitivity rate, and 99.29% F-measure rate. In the future directions of this article, more research should be done on a variety of things, including varying and sophisticated techniques of altering the URL defacement since it would better calibrate the model for application in real-life situations. Received: 28 October 2024 | Revised: 16 December 2024 | Accepted: 1 January 2025 Conflicts of Interest The authors declare that they have no conflicts of interest to this work. Data Availability Statement The data that support the findings of this study are openly available in URL dataset (ISCX-URL2016) at: https://www.unb.ca/cic/datasets/url-2016.html. Author Contribution Statement Omar Almomani: Conceptualization, Methodology, Software, Investigation, Writing – original draft, Supervision, Project administration. Adeeb Alsaaidah: Conceptualization, Formal analysis, Writing – original draft. Ahmad Adel Abu-Shareha: Methodology, Formal analysis, Investigation, Data curation, Writing – review & editing, Visualization. Abdullah Alzaqebah: Software, Resources, Data curation, Writing–review & editing, Visualization. Mohammed Amin Almaiah: Validation, Resources, Writing – original draft. Qusai Shambour: Resources, Writing – original draft |
|---|---|
| AbstractList | Uniform resource locator (URL) defacement attack can be defined as any cyberattack in which the attacker replaces the appearance or content of the targeted webpage with their own that is intended to disgrace, mislead, or malign the website. Detecting URL defacement attacks is significant to avoid breaching the security of the website content or its configuration files, modifying the file locations, templates, or attacks on the website environment and applications. A machine learning (ML) technique can be used to detect the defacement attack on any website with complex content and structure, as opposed to the classical techniques for detection, such as Diff comparison, Document Object model tree analysis, and checksum, which can only be applied to static websites. This article proposes a feature selection model based on particle swarm optimization with support vector machine, decision tree, random forest, Naive Bayes, and k-nearest neighbor ML classification algorithms. The proposed model aims to improve the URL defacement attack detection by selecting the best features from the ISCX-URL-2016 dataset. Then, the reduced set of features produced by the proposed model step is used as input to evaluate and compare the results of the used ML classifiers. The results showed that the proposed model has significantly reduced the features, regarding the classification's feature reduction, the random forest classifier outperformed other classifiers in terms of true positive rates, accuracy, precision, sensitivity, and F-measure, whereas the proposed model with random forest classifier has 99.21% True positive rates, 99.29% accuracy rate, 99.38% precision rate, 99.21% sensitivity rate, and 99.29% F-measure rate. In the future directions of this article, more research should be done on a variety of things, including varying and sophisticated techniques of altering the URL defacement since it would better calibrate the model for application in real-life situations. Received: 28 October 2024 | Revised: 16 December 2024 | Accepted: 1 January 2025 Conflicts of Interest The authors declare that they have no conflicts of interest to this work. Data Availability Statement The data that support the findings of this study are openly available in URL dataset (ISCX-URL2016) at: https://www.unb.ca/cic/datasets/url-2016.html. Author Contribution Statement Omar Almomani: Conceptualization, Methodology, Software, Investigation, Writing – original draft, Supervision, Project administration. Adeeb Alsaaidah: Conceptualization, Formal analysis, Writing – original draft. Ahmad Adel Abu-Shareha: Methodology, Formal analysis, Investigation, Data curation, Writing – review & editing, Visualization. Abdullah Alzaqebah: Software, Resources, Data curation, Writing–review & editing, Visualization. Mohammed Amin Almaiah: Validation, Resources, Writing – original draft. Qusai Shambour: Resources, Writing – original draft |
| Author | Abu-Shareha, Ahmad Adel Shambour, Qusai Almomani, Omar Amin Almaiah, Mohammed Alzaqebah, Abdullah Alsaaidah, Adeeb |
| Author_xml | – sequence: 1 givenname: Omar orcidid: 0000-0003-3160-6542 surname: Almomani fullname: Almomani, Omar – sequence: 2 givenname: Adeeb orcidid: 0000-0003-4380-7771 surname: Alsaaidah fullname: Alsaaidah, Adeeb – sequence: 3 givenname: Ahmad Adel orcidid: 0000-0002-2374-3152 surname: Abu-Shareha fullname: Abu-Shareha, Ahmad Adel – sequence: 4 givenname: Abdullah surname: Alzaqebah fullname: Alzaqebah, Abdullah – sequence: 5 givenname: Mohammed surname: Amin Almaiah fullname: Amin Almaiah, Mohammed – sequence: 6 givenname: Qusai orcidid: 0000-0002-3026-845X surname: Shambour fullname: Shambour, Qusai |
| BookMark | eNp1kMtOwzAQRS1UJErpH7DwDwTs2E7SZRXKS0FFQLdEY2dCDYlTJYaofD2lLYgNq7ka3XMX55gMXOOQkFPOzmScqPBcN-7DYn-bpjMVslBGUXJAhmHCWTBRTAx-c8yOyLjrrGaKxULICR-S55lbgjNIFw8ZvcASDNboPJ16D-Zt8_FovG0cXXTWvdB7aL01FdLHHtqazlfe1vYTtg1wBb0Ds7QOaYbQug1wQg5LqDoc7--ILC5nT-l1kM2vbtJpFhgeiSRQulDSaFGaAiMwjJVCxoUsODcgBXIWTbgQUAiltQxFmWgEpVnCvttxqMSIqN3uu1vBuoeqyletraFd55zlW0_53tOrMfjjacPJHWfaputaLP_F_uoVXweocmA |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY |
| DOI | 10.47852/bonviewJCCE52024668 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2810-9503 |
| ExternalDocumentID | 10.47852/bonviewjcce52024668 10_47852_bonviewJCCE52024668 |
| GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION M~E ADTOC UNPAY |
| ID | FETCH-LOGICAL-c1638-5bd54cb3fcde6ac00f347d4d11ca43e1069133ad35bb423f8bea5b080e6ac7253 |
| IEDL.DBID | UNPAY |
| ISSN | 2810-9570 2810-9503 |
| IngestDate | Sun Sep 07 11:22:36 EDT 2025 Tue Jul 01 05:30:40 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1638-5bd54cb3fcde6ac00f347d4d11ca43e1069133ad35bb423f8bea5b080e6ac7253 |
| ORCID | 0000-0002-2374-3152 0000-0003-3160-6542 0000-0002-3026-845X 0000-0003-4380-7771 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.47852/bonviewjcce52024668 |
| ParticipantIDs | unpaywall_primary_10_47852_bonviewjcce52024668 crossref_primary_10_47852_bonviewJCCE52024668 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2025-08-29 |
| PublicationDateYYYYMMDD | 2025-08-29 |
| PublicationDate_xml | – month: 08 year: 2025 text: 2025-08-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of Computational and Cognitive Engineering |
| PublicationYear | 2025 |
| SSID | ssib050733491 |
| Score | 2.3369026 |
| Snippet | Uniform resource locator (URL) defacement attack can be defined as any cyberattack in which the attacker replaces the appearance or content of the targeted... |
| SourceID | unpaywall crossref |
| SourceType | Open Access Repository Index Database |
| Title | Enhance URL Defacement Attack Detection Using Particle Swarm Optimization and Machine Learning |
| URI | https://doi.org/10.47852/bonviewjcce52024668 |
| UnpaywallVersion | publishedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2810-9503 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib050733491 issn: 2810-9570 databaseCode: M~E dateStart: 20220101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7s8qAvXlBxXkYefLSza5KmexyzQ4adQy3MF0eSporbujE6hj74201vMoWBvpXShPCdQ_J96bkAXDCsNRe3mEGdJjaIwNzgwsKGtEJNJ4QgLO0Z6fXtG5_0hnRYgssiF2bt_z1hDrWuxCxK7sjfpFRUC3Vi204ZqjbVzLsCVb8_aD8l_eMcvZ20aNoIOX9mZpYpt3GaHyfR1jKa8_cVn0zWjpfuLnjFwrKoknFjGYuG_PhVs_GvK9-DnZxnonbmGPtQUtEBPLvRa2Jl5N_fomsVcpleDqJ2HHM51m_iNDArQmkgARrkboUeVnwxRXd6d5nmaZuIRwHy0kBMhfIarS-H4Hfdx86NkTdYMGRCwwwqAkqkwKEMlM2laYaYsIAEzabkBCutFltawvIAU200C4eOUJwKzTGTr5lF8RFUolmkjgHZktnExBSzZIIwEFpWOoILpRmNCiSpgVGAPZpndTRGWn-kSI1ypHqdjlsgVYPGt0U2DliH9uS_A05h20p6-ZpJFsoZVOLFUp1rghGLOpS9T7eee9cX1pbPDQ |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8IwGG4QDnrxI2rEr_Tg0eJY23UcCUIIESTqErxI2q7TCBRCRoj-etutGDQh0duyrE3zvG_a5-neDwCuGDaai_sM0bCKERGYIy58jKSfGDohBGFZz8huL2hHpDOggwK4XuXCrP2_Jyyk_o2YantH_i6lokaokyAIt0ApoIZ5F0Ep6vXrz7Z_XGi2kxrNGiG7Z-blmXIbp_lxEm0v9Ix_LPl4vHa8tPZAd7WwPKpkVFmkoiI_f9Vs_OvK98Gu45mwnjvGASgofQhemvrNWhlGD3fwViVcZpeDsJ6mXI7MmzQLzNIwCySAfedW8HHJ5xN4b3aXiUvbhFzHsJsFYiroarS-HoGo1XxqtJFrsICkpWGIipgSKXAiYxVw6XkJJiwmcbUqOcHKqMWakbA8xtQYzcdJKBSnwnBM-zXzKT4GRT3V6gTAQLKAeJhiZidIYmFkZSi4UIbRqFiSMkArsIezvI7G0OiPDKmhQ6rTaDRXSJVB5dsiGwesQ3v63wFnYMe3vXw9m4VyDorpfKEuDMFIxaXzqy8A4s3c |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhance+URL+Defacement+Attack+Detection+Using+Particle+Swarm+Optimization+and+Machine+Learning&rft.jtitle=Journal+of+Computational+and+Cognitive+Engineering&rft.au=Almomani%2C+Omar&rft.au=Alsaaidah%2C+Adeeb&rft.au=Abu-Shareha%2C+Ahmad+Adel&rft.au=Alzaqebah%2C+Abdullah&rft.date=2025-08-29&rft.issn=2810-9570&rft.eissn=2810-9503&rft_id=info:doi/10.47852%2FbonviewJCCE52024668&rft.externalDBID=n%2Fa&rft.externalDocID=10_47852_bonviewJCCE52024668 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2810-9570&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2810-9570&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2810-9570&client=summon |