A Survey on Internet based Security Threats and Malicious Page Detection Techniques
Deepali Gupta1 , Jasmine Minj2
Section:Survey Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 832-836, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.832836
Online published on Nov 30, 2018
Copyright © Deepali Gupta, Jasmine Minj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Deepali Gupta, Jasmine Minj, “A Survey on Internet based Security Threats and Malicious Page Detection Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.832-836, 2018.
MLA Style Citation: Deepali Gupta, Jasmine Minj "A Survey on Internet based Security Threats and Malicious Page Detection Techniques." International Journal of Computer Sciences and Engineering 6.11 (2018): 832-836.
APA Style Citation: Deepali Gupta, Jasmine Minj, (2018). A Survey on Internet based Security Threats and Malicious Page Detection Techniques. International Journal of Computer Sciences and Engineering, 6(11), 832-836.
BibTex Style Citation:
@article{Gupta_2018,
author = {Deepali Gupta, Jasmine Minj},
title = {A Survey on Internet based Security Threats and Malicious Page Detection Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {832-836},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3252},
doi = {https://doi.org/10.26438/ijcse/v6i11.832836}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.832836}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3252
TI - A Survey on Internet based Security Threats and Malicious Page Detection Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali Gupta, Jasmine Minj
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 832-836
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
431 | 297 downloads | 295 downloads |
Abstract
The vindictive site is a typical and genuine danger to digital security. Pernicious URLs have spontaneous substance like spam, phishing, drive-by misuses, and so on and draw clueless clients to wind up casualties of tricks like financial misfortune, burglary of private data, and malware establishment and so on which cause misfortunes of billions of dollars consistently. It is basic to recognize and follow up on such dangers in an opportune way. To improve the generality of malicious URL detectors, various kinds of techniques using both static and dynamic features have been explored with increasing attention in recent years. In this study, we center principally on examining the real methodologies for pernicious URL recognition procedures and work directed in the zone.
Key-Words / Index Term
Static Analysis, Dynamic Analysis, Security Threats, Application-based threat, Mobile-based threat, Network threats, Web-based threat, Physical Threats, Blacklisting, Machine Learning
References
[1] D. Sahoo, C.Liu, and S.C.H. Hoi,” Malicious URL Detection using Machine Learning: A Survey”,arXiv , March 2017 For Journal
[2] A.A.Ahmed*, N.Q.M. Mohammad, “Malicious Website Detection: A Review”,Journal of Forensic Sciences, Volume - 7 Issue - 3 February 2018 DOI: 10.19080/JFSCI.2018.07.555712
[3] http://etutorials.org/Networking/Router+firewall+security/Part+I+Security+Overview+and+Firewalls/Chapter+1.+Security+Threats/Types+of+Security+Threats/.
[4] https://itexico.com/blog/bid/92948/Knowing-the-Mobile-App-Security-Threats-How-to-Prevent-Them.
[5] https://www.csoonline.com/article/2157785/data-protection/five-new-threats-to-your-mobile-security.html.
[6] D.Sahoo, C.Liu, and S.C.H. Hoi,”Malicious URL Detection using Machine Learning: A Survey”,arXiv:1701.07179v2 [cs.LG], Mar 2017.
[7] D. Canali, M. Cova, G. Vigna, and C. Kruegel, “Prophiler: a fast filter for the large-scale detection of malicious web pages,” in Proceedings of the 20th international conference on World wide web. ACM, 2011, pp. 197–206.
[8] B. Eshete, A. Villafiorita, and K. Weldemariam, “Binspect: Holistic analysis and detection of malicious web pages,” in Security and Privacy in Communication Networks. Springer, 2013, pp. 149–166.C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[9] S. Sinha, M. Bailey, and F. Jahanian, “Shades of grey: On the effectiveness of reputation-based “blacklists”,” in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 2008, pp. 57–64.
[10] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing blacklists,” in Proceedings of Sixth Conference on Email and Anti-Spam (CEAS), 2009.
[11] M. Kuyama, Y. Kakizaki, and R. Sasaki, “Method for detecting a malicious domain by using whois and dns features,” in The Third International Conference on Digital Security and Forensics (DigitalSec2016), 2016, p. 74.
[12] S. C. Hoi, J. Wang, and P. Zhao, “Libol: A library for online learning algorithms,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 495–499, 2014.
[13] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 1245–1254.
[14] “Learning to detect malicious urls,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 30, 2011.