Liu et al., 2016 - Google Patents
Learning based malicious web sites detection using suspicious URLsLiu et al., 2016
View PDF- Document ID
- 14837380498435380077
- Author
- Liu H
- Pan X
- Qu Z
- Publication year
- Publication venue
- Software Engineering
External Links
Snippet
Malicious Web sites largely promote the growth of Internet criminal activities and constrain the development of Web services. As a result, there has been strong motivation to develop systemic solution to stopping the user from visiting such Web sites. In this paper, we propose …
- 238000001514 detection method 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
Kharraz et al. | Surveylance: Automatically detecting online survey scams | |
Hao et al. | PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration | |
Kintis et al. | Hiding in plain sight: A longitudinal study of combosquatting abuse | |
Hong et al. | Phishing url detection with lexical features and blacklisted domains | |
Jeeva et al. | Intelligent phishing url detection using association rule mining | |
Chu et al. | Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs | |
ES2866723T3 (en) | Online fraud detection dynamic score aggregation methods and systems | |
Amrutkar et al. | Detecting mobile malicious webpages in real time | |
Nowroozi et al. | An adversarial attack analysis on malicious advertisement URL detection framework | |
Deshpande et al. | Detection of phishing websites using Machine Learning | |
Ramesh et al. | Identification of phishing webpages and its target domains by analyzing the feign relationship | |
Le Page et al. | Domain classifier: Compromised machines versus malicious registrations | |
Akour et al. | Using classical machine learning for phishing websites detection from URLs | |
Casino et al. | Analysis and correlation of visual evidence in campaigns of malicious office documents | |
Dam et al. | Large-scale analysis of pop-up scam on typosquatting urls | |
Shyni et al. | Phishing detection in websites using parse tree validation | |
Gallo et al. | Identifying threats in a large company's inbox | |
Liu et al. | Learning based malicious web sites detection using suspicious URLs | |
Noh et al. | Phishing website detection using random forest and support vector machine: A comparison | |
Ghalechyan et al. | Phishing URL detection with neural networks: an empirical study | |
Kotzias et al. | Scamdog millionaire: Detecting e-commerce scams in the wild | |
Orunsolu et al. | An Anti-Phishing Kit Scheme for Secure Web Transactions. | |
Zhang et al. | A real-time automatic detection of phishing URLs | |
Tofighi et al. | Constructs of deceit: exploring nuances in modern social engineering attacks |