Mumu et al., 2023 - Google Patents
Malicious URL detection using machine learning and deep learning algorithmsMumu et al., 2023
View PDF- Document ID
- 17129981901764819748
- Author
- Mumu M
- Aishy T
- Publication year
External Links
Snippet
The majority of commercial enterprises rely on the World Wide Web's Internet services (WWW). These services are vulnerable to cyberattacks. The majority of cyberattacks occur when users click on malicious URLs. URL is an abbreviation for Uniform Resource Locator …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
Adebowale et al. | Intelligent phishing detection scheme using deep learning algorithms | |
Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
Odeh et al. | Machine learningtechniquesfor detection of website phishing: A review for promises and challenges | |
El-Alfy | Detection of phishing websites based on probabilistic neural networks and K-medoids clustering | |
Aljabri et al. | An Assessment of Lexical, Network, and Content‐Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models | |
Abutair et al. | CBR-PDS: a case-based reasoning phishing detection system | |
Gandotra et al. | Improving spoofed website detection using machine learning | |
Vinayakumar et al. | Deep learning framework for cyber threat situational awareness based on email and url data analysis | |
Bui et al. | Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems | |
Park et al. | Unsupervised malicious domain detection with less labeling effort | |
Halder et al. | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | |
Taofeek | Development of a Novel Approach to Phishing Detection Using Machine Learning | |
Mumu et al. | Malicious URL detection using machine learning and deep learning algorithms | |
Noh et al. | Phishing Website Detection Using Random Forest and Support Vector Machine: A Comparison | |
Ray et al. | Detection of malicious URLs using deep learning approach | |
Zaimi et al. | A deep learning approach to detect phishing websites using CNN for privacy protection | |
Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
Chaudhary et al. | A review on malicious link detection techniques | |
Deliu | Extracting cyber threat intelligence from hacker forums | |
Kulkarni et al. | Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques | |
Goje et al. | Phishing Email Mitigation Technique Using Back-Propagation Neural Network for Cyber Space | |
Jena et al. | Malicious Spam Detection to Avoid Vicious Attack | |
Dwan Jr et al. | Predictive Analysis: Machine Learning Models for URL Classification | |
Nthurima et al. | A Classifier Model to Detect Phishing Emails Using Ensemble Technique |