[go: up one dir, main page]

Popescu et al., 2015 - Google Patents

A study on techniques for proactively identifying malicious URLs

Popescu et al., 2015

Document ID
5105862070250388622
Author
Popescu A
Prelipcean D
Gavrilut D
Publication year
Publication venue
2015 17th International symposium on symbolic and numeric algorithms for scientific computing (SYNASC)

External Links

Snippet

As most of the malware nowadays use Internet as their main doorway to infect a new system, it has become imperative for security vendors to provide cloud-based solutions that can filter and block malicious URLs. This paper presents different practical considerations related to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Mahajan et al. Phishing website detection using machine learning algorithms
Chu et al. Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs
Zhang et al. Arrow: Generating signatures to detect drive-by downloads
Jain et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list
Stevanovic et al. Detection of malicious and non-malicious website visitors using unsupervised neural network learning
Afroz et al. Phishzoo: Detecting phishing websites by looking at them
Choi et al. Detecting malicious web links and identifying their attack types
James et al. Detection of phishing URLs using machine learning techniques
Khan et al. Defending malicious script attacks using machine learning classifiers
Xiang et al. Cantina+ a feature-rich machine learning framework for detecting phishing web sites
Patil et al. Survey on malicious web pages detection techniques
US8521667B2 (en) Detection and categorization of malicious URLs
Abutair et al. CBR-PDS: a case-based reasoning phishing detection system
Kim et al. Detecting fake anti-virus software distribution webpages
Aung et al. A survey of URL-based phishing detection
Aldwairi et al. Malurls: A lightweight malicious website classification based on url features
Madhubala et al. Survey on malicious URL detection techniques
Mohaisen Towards automatic and lightweight detection and classification of malicious web contents
Aung et al. URL-based phishing detection using the entropy of non-alphanumeric characters
Su et al. Suspicious URL filtering based on logistic regression with multi-view analysis
Sun et al. Contaminant removal for android malware detection systems
Popescu et al. A study on techniques for proactively identifying malicious URLs
Zhang et al. A real-time automatic detection of phishing URLs