A Survey on Internet based Security Threats and Malicious Page Detection Techniques
DOI:
https://doi.org/10.26438/ijcse/v6i11.832836Keywords:
Static Analysis, Dynamic Analysis, Security Threats, Application-based threat, Mobile-based threat, Network threats, Web-based threat, Physical Threats, Blacklisting, Machine LearningAbstract
The vindictive site is a typical and genuine danger to digital security. Pernicious URLs have spontaneous substance like spam, phishing, drive-by misuses, and so on and draw clueless clients to wind up casualties of tricks like financial misfortune, burglary of private data, and malware establishment and so on which cause misfortunes of billions of dollars consistently. It is basic to recognize and follow up on such dangers in an opportune way. To improve the generality of malicious URL detectors, various kinds of techniques using both static and dynamic features have been explored with increasing attention in recent years. In this study, we center principally on examining the real methodologies for pernicious URL recognition procedures and work directed in the zone
References
[1] D. Sahoo, C.Liu, and S.C.H. Hoi,” Malicious URL Detection using Machine Learning: A Survey”,arXiv , March 2017 For Journal
[2] A.A.Ahmed*, N.Q.M. Mohammad, “Malicious Website Detection: A Review”,Journal of Forensic Sciences, Volume - 7 Issue - 3 February 2018 DOI: 10.19080/JFSCI.2018.07.555712
[4] https://itexico.com/blog/bid/92948/Knowing-the-Mobile-App-Security-Threats-How-to-Prevent-Them.
[6] D.Sahoo, C.Liu, and S.C.H. Hoi,”Malicious URL Detection using Machine Learning: A Survey”,arXiv:1701.07179v2 [cs.LG], Mar 2017.
[7] D. Canali, M. Cova, G. Vigna, and C. Kruegel, “Prophiler: a fast filter for the large-scale detection of malicious web pages,” in Proceedings of the 20th international conference on World wide web. ACM, 2011, pp. 197–206.
[8] B. Eshete, A. Villafiorita, and K. Weldemariam, “Binspect: Holistic analysis and detection of malicious web pages,” in Security and Privacy in Communication Networks. Springer, 2013, pp. 149–166.C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[9] S. Sinha, M. Bailey, and F. Jahanian, “Shades of grey: On the effectiveness of reputation-based “blacklists”,” in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 2008, pp. 57–64.
[10] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing blacklists,” in Proceedings of Sixth Conference on Email and Anti-Spam (CEAS), 2009.
[11] M. Kuyama, Y. Kakizaki, and R. Sasaki, “Method for detecting a malicious domain by using whois and dns features,” in The Third International Conference on Digital Security and Forensics (DigitalSec2016), 2016, p. 74.
[12] S. C. Hoi, J. Wang, and P. Zhao, “Libol: A library for online learning algorithms,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 495–499, 2014.
[13] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 1245–1254.
[14] “Learning to detect malicious urls,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 30, 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
