[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Mumu et al., 2023 - Google Patents

Malicious URL detection using machine learning and deep learning algorithms

Mumu et al., 2023

View PDF
Document ID
17129981901764819748
Author
Mumu M
Aishy T
Publication year

External Links

Snippet

The majority of commercial enterprises rely on the World Wide Web's Internet services (WWW). These services are vulnerable to cyberattacks. The majority of cyberattacks occur when users click on malicious URLs. URL is an abbreviation for Uniform Resource Locator …
Continue reading at 103.133.167.11:8080 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Adebowale et al. Intelligent phishing detection scheme using deep learning algorithms
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Odeh et al. Machine learningtechniquesfor detection of website phishing: A review for promises and challenges
El-Alfy Detection of phishing websites based on probabilistic neural networks and K-medoids clustering
Aljabri et al. An Assessment of Lexical, Network, and Content‐Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models
Abutair et al. CBR-PDS: a case-based reasoning phishing detection system
Gandotra et al. Improving spoofed website detection using machine learning
Vinayakumar et al. Deep learning framework for cyber threat situational awareness based on email and url data analysis
Bui et al. Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Park et al. Unsupervised malicious domain detection with less labeling effort
Halder et al. Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem
Taofeek Development of a Novel Approach to Phishing Detection Using Machine Learning
Mumu et al. Malicious URL detection using machine learning and deep learning algorithms
Noh et al. Phishing Website Detection Using Random Forest and Support Vector Machine: A Comparison
Ray et al. Detection of malicious URLs using deep learning approach
Zaimi et al. A deep learning approach to detect phishing websites using CNN for privacy protection
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Chaudhary et al. A review on malicious link detection techniques
Deliu Extracting cyber threat intelligence from hacker forums
Kulkarni et al. Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques
Goje et al. Phishing Email Mitigation Technique Using Back-Propagation Neural Network for Cyber Space
Jena et al. Malicious Spam Detection to Avoid Vicious Attack
Dwan Jr et al. Predictive Analysis: Machine Learning Models for URL Classification
Nthurima et al. A Classifier Model to Detect Phishing Emails Using Ensemble Technique