Lee et al., 2020 - Google Patents
Building robust phishing detection system: an empirical analysisLee et al., 2020
View PDF- Document ID
- 9977805475180929
- Author
- Lee J
- Ye P
- Liu R
- Divakaran D
- Chan M
- Publication year
- Publication venue
- NDSS MADWeb
External Links
Snippet
To tackle phishing attacks, recent research works have resorted to the application of machine learning (ML) algorithms, yielding promising results. Often, a binary classification model is trained on labeled datasets of benign and phishing URLs (and contents) obtained …
- 238000001514 detection method 0 title abstract description 88
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Korkmaz et al. | Detection of phishing websites by using machine learning-based URL analysis | |
| Odeh et al. | Machine learningtechniquesfor detection of website phishing: A review for promises and challenges | |
| Abu Al-Haija et al. | An intelligent identification and classification system for malicious uniform resource locators (URLs) | |
| Ho et al. | Detecting and characterizing lateral phishing at scale | |
| Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
| Lee et al. | Building robust phishing detection system: an empirical analysis | |
| Hossain et al. | Machine learning-based phishing attack detection | |
| Gandotra et al. | Improving spoofed website detection using machine learning | |
| Geyik et al. | Detection of phishing websites from URLs by using classification techniques on WEKA | |
| Sahingoz et al. | Phishing detection from urls by using neural networks | |
| Salloum et al. | Phishing website detection from URLs using classical machine learning ANN model | |
| Bhardwaj et al. | Detection of cyber attacks: Xss, sqli, phishing attacks and detecting intrusion using machine learning algorithms | |
| Anand et al. | A comprehensive study of DDoS attack on internet of things network | |
| Parameswarappa et al. | A machine learning-based approach for anomaly detection for secure cloud computing environments | |
| Rajeswary et al. | A comprehensive survey of automated website phishing detection techniques: a perspective of artificial intelligence and human behaviors | |
| Kulkarni et al. | Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques | |
| Pillai et al. | Evasion attacks and defense mechanisms for machine learning-based web phishing classifiers | |
| Banik et al. | Phishing URL detection system based on URL features using SVM | |
| Deshpande et al. | A systematic review on website phishing attack detection for online users | |
| Lamina et al. | AI-powered phishing detection and prevention | |
| Rangaraju et al. | AI-based solutions for improving cybersecurity and its significance in defending evolving cyber threats in enterprises | |
| Saini et al. | A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures | |
| Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
| Rani et al. | Analysis of machine learning and deep learning intrusion detection system in internet of things network | |
| Abidoye et al. | Hybrid machine learning: A tool to detect phishing attacks in communication networks |