2013 IEEE International Conference on Big Data 2013
DOI: 10.1109/bigdata.2013.6691627
|View full text |Cite
|
Sign up to set email alerts
|

Malicious URL filtering — A big data application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
5

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(57 citation statements)
references
References 9 publications
0
52
0
5
Order By: Relevance
“…The proposed schemes can be classified into either static or dynamic detection systems. Some lightweight static detection systems focus on the lexical features of a URL [19], as well as DNS and WHOIS information [11]. And other static detection systems extract additional features from the HTML content and JavaScript codes [7].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed schemes can be classified into either static or dynamic detection systems. Some lightweight static detection systems focus on the lexical features of a URL [19], as well as DNS and WHOIS information [11]. And other static detection systems extract additional features from the HTML content and JavaScript codes [7].…”
Section: Related Workmentioning
confidence: 99%
“…The research on new methods for sketching, anomaly detection, noise removal, feature extraction, outliers detection, and pre-filtering of streaming data is required to reduce big data effectively. In addition, the deployment of adaptive learning models in conjunction with said methods can aid in dynamic preprocessing of big streaming data [21].…”
Section: Open Research Issuesmentioning
confidence: 99%
“…The authors in [21] proposed two feature reduction techniques that extract the lexical features and the descriptive features and then combine their results. The lexical features extract the structure of the URLs.…”
Section: Data Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…Chu et al [12] used only lexical and domain features of URLs to detect phishing sites based on machine learning methods. Lin et al [13] generated online learning algorithms using lexical features and descriptive features working on large scale URL dataset to reduce the volume of URL queries on which further analysis needs to be performed. Huang et al [14] propose to dynamically extract lexical patterns from URLs instead of using any pre-defined features or fixed delimiters for feature selection.…”
Section: Related Workmentioning
confidence: 99%