Chaudhary et al., 2023 - Google Patents
A review on malicious link detection techniquesChaudhary et al., 2023
- Document ID
- 10038985496590649455
- Author
- Chaudhary A
- Krishna K
- Shadik M
- Raj D
- Publication year
- Publication venue
- Artificial Intelligence, Blockchain, Computing and Security Volume 1
External Links
Snippet
Recent advancement in technology has led to more and more use of the internet and its services. Many people use the internet for their day-to-day tasks like buying things from the internet, chatting with friends through social media, sending mail, and it is also used by …
- 238000001514 detection method 0 title abstract description 55
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karim et al. | Phishing detection system through hybrid machine learning based on URL | |
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Kumar et al. | Phishing website classification and detection using machine learning | |
Moghimi et al. | New rule-based phishing detection method | |
Akanbi et al. | A machine-learning approach to phishing detection and defense | |
Ma et al. | Beyond blacklists: learning to detect malicious web sites from suspicious URLs | |
Hossain et al. | Machine learning-based phishing attack detection | |
Kara et al. | Characteristics of understanding URLs and domain names features: the detection of phishing websites with machine learning methods | |
Sahingoz et al. | Phishing detection from urls by using neural networks | |
Chaudhary et al. | A review on malicious link detection techniques | |
Alkawaz et al. | Identification and analysis of phishing website based on machine learning methods | |
Atrees et al. | Enhancing Detection of Malicious URLs Using Boosting and Lexical Features. | |
Basnet et al. | Learning to Detect Phishing Webpages. | |
Yearwood et al. | Profiling phishing activity based on hyperlinks extracted from phishing emails | |
Noh et al. | Phishing website detection using random forest and support vector machine: A comparison | |
Tultul et al. | Comparison of the efficiency of machine learning algorithms for phishing detection from uniform resource locator | |
Swarnalatha et al. | Real-time threat intelligence-block phising attacks | |
Kulkarni et al. | Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques | |
Zhou et al. | Enhancing phishing detection in semantic web systems using optimized deep learning models | |
Maurya et al. | Browser extension based hybrid anti-phishing framework using feature selection | |
Kamble et al. | Hybrid optimization enabled squeeze net for phishing attack detection | |
Ahmed et al. | A framework for phishing attack identification using rough set and formal concept analysis | |
Patil et al. | Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. | |
Ray et al. | Detection of malicious URLs using deep learning approach | |
Abhijith et al. | Detection of malicious URLs in twitter |