Popescu et al., 2015 - Google Patents
A study on techniques for proactively identifying malicious URLsPopescu et al., 2015
- Document ID
- 5105862070250388622
- Author
- Popescu A
- Prelipcean D
- Gavrilut D
- Publication year
- Publication venue
- 2015 17th International symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
External Links
Snippet
As most of the malware nowadays use Internet as their main doorway to infect a new system, it has become imperative for security vendors to provide cloud-based solutions that can filter and block malicious URLs. This paper presents different practical considerations related to …
- 238000000034 method 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
| Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
| Mahajan et al. | Phishing website detection using machine learning algorithms | |
| Chu et al. | Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs | |
| Zhang et al. | Arrow: Generating signatures to detect drive-by downloads | |
| Jain et al. | A novel approach to protect against phishing attacks at client side using auto-updated white-list | |
| Stevanovic et al. | Detection of malicious and non-malicious website visitors using unsupervised neural network learning | |
| Afroz et al. | Phishzoo: Detecting phishing websites by looking at them | |
| Choi et al. | Detecting malicious web links and identifying their attack types | |
| James et al. | Detection of phishing URLs using machine learning techniques | |
| Khan et al. | Defending malicious script attacks using machine learning classifiers | |
| Xiang et al. | Cantina+ a feature-rich machine learning framework for detecting phishing web sites | |
| Patil et al. | Survey on malicious web pages detection techniques | |
| US8521667B2 (en) | Detection and categorization of malicious URLs | |
| Abutair et al. | CBR-PDS: a case-based reasoning phishing detection system | |
| Kim et al. | Detecting fake anti-virus software distribution webpages | |
| Aung et al. | A survey of URL-based phishing detection | |
| Aldwairi et al. | Malurls: A lightweight malicious website classification based on url features | |
| Madhubala et al. | Survey on malicious URL detection techniques | |
| Mohaisen | Towards automatic and lightweight detection and classification of malicious web contents | |
| Aung et al. | URL-based phishing detection using the entropy of non-alphanumeric characters | |
| Su et al. | Suspicious URL filtering based on logistic regression with multi-view analysis | |
| Sun et al. | Contaminant removal for android malware detection systems | |
| Popescu et al. | A study on techniques for proactively identifying malicious URLs | |
| Zhang et al. | A real-time automatic detection of phishing URLs |