[go: up one dir, main page]

Lee et al., 2020 - Google Patents

Building robust phishing detection system: an empirical analysis

Lee et al., 2020

View PDF
Document ID
9977805475180929
Author
Lee J
Ye P
Liu R
Divakaran D
Chan M
Publication year
Publication venue
NDSS MADWeb

External Links

Snippet

To tackle phishing attacks, recent research works have resorted to the application of machine learning (ML) algorithms, yielding promising results. Often, a binary classification model is trained on labeled datasets of benign and phishing URLs (and contents) obtained …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • G06K9/627Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory

Similar Documents

Publication Publication Date Title
Korkmaz et al. Detection of phishing websites by using machine learning-based URL analysis
Odeh et al. Machine learningtechniquesfor detection of website phishing: A review for promises and challenges
Abu Al-Haija et al. An intelligent identification and classification system for malicious uniform resource locators (URLs)
Ho et al. Detecting and characterizing lateral phishing at scale
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Lee et al. Building robust phishing detection system: an empirical analysis
Hossain et al. Machine learning-based phishing attack detection
Gandotra et al. Improving spoofed website detection using machine learning
Geyik et al. Detection of phishing websites from URLs by using classification techniques on WEKA
Sahingoz et al. Phishing detection from urls by using neural networks
Salloum et al. Phishing website detection from URLs using classical machine learning ANN model
Bhardwaj et al. Detection of cyber attacks: Xss, sqli, phishing attacks and detecting intrusion using machine learning algorithms
Anand et al. A comprehensive study of DDoS attack on internet of things network
Parameswarappa et al. A machine learning-based approach for anomaly detection for secure cloud computing environments
Rajeswary et al. A comprehensive survey of automated website phishing detection techniques: a perspective of artificial intelligence and human behaviors
Kulkarni et al. Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
Pillai et al. Evasion attacks and defense mechanisms for machine learning-based web phishing classifiers
Banik et al. Phishing URL detection system based on URL features using SVM
Deshpande et al. A systematic review on website phishing attack detection for online users
Lamina et al. AI-powered phishing detection and prevention
Rangaraju et al. AI-based solutions for improving cybersecurity and its significance in defending evolving cyber threats in enterprises
Saini et al. A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Rani et al. Analysis of machine learning and deep learning intrusion detection system in internet of things network
Abidoye et al. Hybrid machine learning: A tool to detect phishing attacks in communication networks