[go: up one dir, main page]

Chaudhary et al., 2023 - Google Patents

A review on malicious link detection techniques

Chaudhary et al., 2023

Document ID
10038985496590649455
Author
Chaudhary A
Krishna K
Shadik M
Raj D
Publication year
Publication venue
Artificial Intelligence, Blockchain, Computing and Security Volume 1

External Links

Snippet

Recent advancement in technology has led to more and more use of the internet and its services. Many people use the internet for their day-to-day tasks like buying things from the internet, chatting with friends through social media, sending mail, and it is also used by …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Karim et al. Phishing detection system through hybrid machine learning based on URL
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Kumar et al. Phishing website classification and detection using machine learning
Moghimi et al. New rule-based phishing detection method
Akanbi et al. A machine-learning approach to phishing detection and defense
Ma et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs
Hossain et al. Machine learning-based phishing attack detection
Kara et al. Characteristics of understanding URLs and domain names features: the detection of phishing websites with machine learning methods
Sahingoz et al. Phishing detection from urls by using neural networks
Chaudhary et al. A review on malicious link detection techniques
Alkawaz et al. Identification and analysis of phishing website based on machine learning methods
Atrees et al. Enhancing Detection of Malicious URLs Using Boosting and Lexical Features.
Basnet et al. Learning to Detect Phishing Webpages.
Yearwood et al. Profiling phishing activity based on hyperlinks extracted from phishing emails
Noh et al. Phishing website detection using random forest and support vector machine: A comparison
Tultul et al. Comparison of the efficiency of machine learning algorithms for phishing detection from uniform resource locator
Swarnalatha et al. Real-time threat intelligence-block phising attacks
Kulkarni et al. Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
Zhou et al. Enhancing phishing detection in semantic web systems using optimized deep learning models
Maurya et al. Browser extension based hybrid anti-phishing framework using feature selection
Kamble et al. Hybrid optimization enabled squeeze net for phishing attack detection
Ahmed et al. A framework for phishing attack identification using rough set and formal concept analysis
Patil et al. Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis.
Ray et al. Detection of malicious URLs using deep learning approach
Abhijith et al. Detection of malicious URLs in twitter