2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) 2019
DOI: 10.1109/iccmc.2019.8819818
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Website Detection Using Probabilistic Data Structure Bloom Filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The bloom filters are both in complex applications and in a simple use such as the one that the improved gradual impairment algorithm is called to do. For this problem, some remarks are made [ 34 , 39 , 57 , 58 ]: It has already been stated that we insert values into a bloom filter rather than items. On the other hand, each potential answer is fundamentally a list, or more specifically, an object that includes the serial numbers of the individual member groups.…”
Section: Discussionmentioning
confidence: 99%
“…The bloom filters are both in complex applications and in a simple use such as the one that the improved gradual impairment algorithm is called to do. For this problem, some remarks are made [ 34 , 39 , 57 , 58 ]: It has already been stated that we insert values into a bloom filter rather than items. On the other hand, each potential answer is fundamentally a list, or more specifically, an object that includes the serial numbers of the individual member groups.…”
Section: Discussionmentioning
confidence: 99%
“…The primary glitch in all these data structures is the requirement of more and more space when private keys are attached with the data structure. Therefore, it is significant to use a space-efficient probabilistic data structure [54] for the storage of internal nodes. The Morton filter, an approximate set membership data structure, is used to overcome the problem.…”
Section: Methodsmentioning
confidence: 99%
“…Then, the website to be analyzed is collected by crawling, and the source is checked on the website with the registered signature. The characteristic of this analysis is that it has a faster inspection time than other analysis methods, so it is efficient in detecting a large number of inspection targets in a short time [5].…”
Section: Static Analysis Of Website Security Risksmentioning
confidence: 99%