A Survey on Internet based Security Threats and Malicious Page Detection Techniques

Authors

  • Gupta D Computer Science and Engineering, Vishwavidyalaya Engineering College, Lakhanpur, India
  • Minj J Computer Science and Engineering, Vishwavidyalaya Engineering College, Lakhanpur, India

DOI:

https://doi.org/10.26438/ijcse/v6i11.832836

Keywords:

Static Analysis, Dynamic Analysis, Security Threats, Application-based threat, Mobile-based threat, Network threats, Web-based threat, Physical Threats, Blacklisting, Machine Learning

Abstract

The vindictive site is a typical and genuine danger to digital security. Pernicious URLs have spontaneous substance like spam, phishing, drive-by misuses, and so on and draw clueless clients to wind up casualties of tricks like financial misfortune, burglary of private data, and malware establishment and so on which cause misfortunes of billions of dollars consistently. It is basic to recognize and follow up on such dangers in an opportune way. To improve the generality of malicious URL detectors, various kinds of techniques using both static and dynamic features have been explored with increasing attention in recent years. In this study, we center principally on examining the real methodologies for pernicious URL recognition procedures and work directed in the zone

References

[1] D. Sahoo, C.Liu, and S.C.H. Hoi,” Malicious URL Detection using Machine Learning: A Survey”,arXiv , March 2017 For Journal

[2] A.A.Ahmed*, N.Q.M. Mohammad, “Malicious Website Detection: A Review”,Journal of Forensic Sciences, Volume - 7 Issue - 3 February 2018 DOI: 10.19080/JFSCI.2018.07.555712

[3] http://etutorials.org/Networking/Router+firewall+security/Part+I+Security+Overview+and+Firewalls/Chapter+1.+Security+Threats/Types+of+Security+Threats/.

[4] https://itexico.com/blog/bid/92948/Knowing-the-Mobile-App-Security-Threats-How-to-Prevent-Them.

[5] https://www.csoonline.com/article/2157785/data-protection/five-new-threats-to-your-mobile-security.html.

[6] D.Sahoo, C.Liu, and S.C.H. Hoi,”Malicious URL Detection using Machine Learning: A Survey”,arXiv:1701.07179v2 [cs.LG], Mar 2017.

[7] D. Canali, M. Cova, G. Vigna, and C. Kruegel, “Prophiler: a fast filter for the large-scale detection of malicious web pages,” in Proceedings of the 20th international conference on World wide web. ACM, 2011, pp. 197–206.

[8] B. Eshete, A. Villafiorita, and K. Weldemariam, “Binspect: Holistic analysis and detection of malicious web pages,” in Security and Privacy in Communication Networks. Springer, 2013, pp. 149–166.C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24

[9] S. Sinha, M. Bailey, and F. Jahanian, “Shades of grey: On the effectiveness of reputation-based “blacklists”,” in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 2008, pp. 57–64.

[10] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing blacklists,” in Proceedings of Sixth Conference on Email and Anti-Spam (CEAS), 2009.

[11] M. Kuyama, Y. Kakizaki, and R. Sasaki, “Method for detecting a malicious domain by using whois and dns features,” in The Third International Conference on Digital Security and Forensics (DigitalSec2016), 2016, p. 74.

[12] S. C. Hoi, J. Wang, and P. Zhao, “Libol: A library for online learning algorithms,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 495–499, 2014.

[13] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 1245–1254.

[14] “Learning to detect malicious urls,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 30, 2011.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.832836
Published: 2025-11-18

How to Cite

[1]
D. Gupta and J. Minj, “A Survey on Internet based Security Threats and Malicious Page Detection Techniques”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 832–836, Nov. 2025.