2017
DOI: 10.7753/ijcatr0603.1003
|View full text |Cite
|
Sign up to set email alerts
|

Classification Model to Detect Malicious URL via Behaviour Analysis

Abstract: Abstract:The challenging task in cyber space is to detect malicious URLs. The websites pointed by the malicious URLs injects malicious code into the client machine or steals the crucial information. As detecting a phishing URL is a challenging task, it is essential to enhance detection techniques against the emerging attacks. The most of the existing approaches are feature based and cannot detect dynamic attacks. Mostly the attacker uses the input form, active content and embeds @ symbol in URL for malicious a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 16 publications
(13 reference statements)
0
7
0
Order By: Relevance
“…Fake Login form in a phishing page is a dangerous sign of loss money or sensitive information as listed in Table 1. 13,14,16,[23][24][25][26][27][28][29][30][31][32][33][34][35][36]…”
Section: Suspicious Url Forms or Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Fake Login form in a phishing page is a dangerous sign of loss money or sensitive information as listed in Table 1. 13,14,16,[23][24][25][26][27][28][29][30][31][32][33][34][35][36]…”
Section: Suspicious Url Forms or Patternsmentioning
confidence: 99%
“…Phishing sites have very less life‐time as get block listed. Fake Login form in a phishing page is a dangerous sign of loss money or sensitive information as listed in Table 1 13,14,16,23‐36 …”
Section: Url Feature Setmentioning
confidence: 99%
“…Ralph Edem Agbefu [18] proposed domain information based blacklisting method, that compares the domain properties with a blacklist. This approach is capable to detect traditional attack, but not Solanki et al [15] proposed a decision tree based feature analysis method, to detect phishing attacks. The decision tree algorithm is used for classification.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, attackers used URL to perform an attack on websites. Attackers insert a redirect code into a compromised URLs so that the user will be navigated automatically to malicious URLs [5][6][7]. This malicious URLs also redirect the user to download a malicious application such as botnet into a computer and cause attacker able to collect confidential information such as banking number and contact information [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Malicious URLs continuous to grow and there are 230,000 new malware samples per day [5]. According to Cybint News, the attackers launch their attack for every 39 seconds and have infected 64% of companies [10].…”
Section: Introductionmentioning
confidence: 99%