Mumu et al., 2023 - Google Patents
Malicious URL detection using machine learning and deep learning algorithmsMumu et al., 2023
View PDF- Document ID
- 17129981901764819748
- Author
- Mumu M
- Aishy T
- Publication year
External Links
Snippet
The majority of commercial enterprises rely on the World Wide Web's Internet services (WWW). These services are vulnerable to cyberattacks. The majority of cyberattacks occur when users click on malicious URLs. URL is an abbreviation for Uniform Resource Locator …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Adebowale et al. | Intelligent phishing detection scheme using deep learning algorithms | |
Odeh et al. | Machine learningtechniquesfor detection of website phishing: A review for promises and challenges | |
El-Alfy | Detection of phishing websites based on probabilistic neural networks and K-medoids clustering | |
Abutair et al. | CBR-PDS: a case-based reasoning phishing detection system | |
Vinayakumar et al. | Deep learning framework for cyber threat situational awareness based on email and url data analysis | |
Halder et al. | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | |
Taofeek | Development of a novel approach to phishing detection using machine learning | |
Li et al. | A state-of-the-art review on phishing website detection techniques | |
Noh et al. | Phishing website detection using random forest and support vector machine: A comparison | |
Zaimi et al. | A deep learning approach to detect phishing websites using CNN for privacy protection | |
Chaudhary et al. | A review on malicious link detection techniques | |
Kulkarni et al. | Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques | |
Mumu et al. | Malicious URL detection using machine learning and deep learning algorithms | |
Patil et al. | Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. | |
Ray et al. | Detection of malicious URLs using deep learning approach | |
Deliu | Extracting cyber threat intelligence from hacker forums | |
Goje et al. | Phishing email mitigation technique using back-propagation neural network for cyber space | |
Dwan Jr et al. | Predictive Analysis: Machine Learning Models for URL Classification | |
Abualgasim et al. | Phishing detection methods | |
Chanakya et al. | Web Spoofing Prevention: Machine Learning Based Client-Side Defence | |
Jena et al. | Malicious spam detection to avoid vicious attack | |
Nakano et al. | Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter | |
Araujo Arévalo et al. | Intelligent System for Phishing detection on web pages using Random Forest | |
Rajeswary et al. | The LSTM-based automated phishing detection driven model for detecting multiple attacks on Tor hidden services |