Open Access   Article Go Back

A Survey on Internet based Security Threats and Malicious Page Detection Techniques

Deepali Gupta1 , Jasmine Minj2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 832-836, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.832836

Online published on Nov 30, 2018

Copyright © Deepali Gupta, Jasmine Minj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepali Gupta, Jasmine Minj, “A Survey on Internet based Security Threats and Malicious Page Detection Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.832-836, 2018.

MLA Style Citation: Deepali Gupta, Jasmine Minj "A Survey on Internet based Security Threats and Malicious Page Detection Techniques." International Journal of Computer Sciences and Engineering 6.11 (2018): 832-836.

APA Style Citation: Deepali Gupta, Jasmine Minj, (2018). A Survey on Internet based Security Threats and Malicious Page Detection Techniques. International Journal of Computer Sciences and Engineering, 6(11), 832-836.

BibTex Style Citation:
@article{Gupta_2018,
author = {Deepali Gupta, Jasmine Minj},
title = {A Survey on Internet based Security Threats and Malicious Page Detection Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {832-836},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3252},
doi = {https://doi.org/10.26438/ijcse/v6i11.832836}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.832836}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3252
TI - A Survey on Internet based Security Threats and Malicious Page Detection Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali Gupta, Jasmine Minj
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 832-836
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
397 274 downloads 275 downloads
  
  
           

Abstract

The vindictive site is a typical and genuine danger to digital security. Pernicious URLs have spontaneous substance like spam, phishing, drive-by misuses, and so on and draw clueless clients to wind up casualties of tricks like financial misfortune, burglary of private data, and malware establishment and so on which cause misfortunes of billions of dollars consistently. It is basic to recognize and follow up on such dangers in an opportune way. To improve the generality of malicious URL detectors, various kinds of techniques using both static and dynamic features have been explored with increasing attention in recent years. In this study, we center principally on examining the real methodologies for pernicious URL recognition procedures and work directed in the zone.

Key-Words / Index Term

Static Analysis, Dynamic Analysis, Security Threats, Application-based threat, Mobile-based threat, Network threats, Web-based threat, Physical Threats, Blacklisting, Machine Learning

References

[1] D. Sahoo, C.Liu, and S.C.H. Hoi,” Malicious URL Detection using Machine Learning: A Survey”,arXiv , March 2017 For Journal
[2] A.A.Ahmed*, N.Q.M. Mohammad, “Malicious Website Detection: A Review”,Journal of Forensic Sciences, Volume - 7 Issue - 3 February 2018 DOI: 10.19080/JFSCI.2018.07.555712
[3] http://etutorials.org/Networking/Router+firewall+security/Part+I+Security+Overview+and+Firewalls/Chapter+1.+Security+Threats/Types+of+Security+Threats/.
[4] https://itexico.com/blog/bid/92948/Knowing-the-Mobile-App-Security-Threats-How-to-Prevent-Them.
[5] https://www.csoonline.com/article/2157785/data-protection/five-new-threats-to-your-mobile-security.html.
[6] D.Sahoo, C.Liu, and S.C.H. Hoi,”Malicious URL Detection using Machine Learning: A Survey”,arXiv:1701.07179v2 [cs.LG], Mar 2017.
[7] D. Canali, M. Cova, G. Vigna, and C. Kruegel, “Prophiler: a fast filter for the large-scale detection of malicious web pages,” in Proceedings of the 20th international conference on World wide web. ACM, 2011, pp. 197–206.
[8] B. Eshete, A. Villafiorita, and K. Weldemariam, “Binspect: Holistic analysis and detection of malicious web pages,” in Security and Privacy in Communication Networks. Springer, 2013, pp. 149–166.C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[9] S. Sinha, M. Bailey, and F. Jahanian, “Shades of grey: On the effectiveness of reputation-based “blacklists”,” in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 2008, pp. 57–64.
[10] S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, “An empirical analysis of phishing blacklists,” in Proceedings of Sixth Conference on Email and Anti-Spam (CEAS), 2009.
[11] M. Kuyama, Y. Kakizaki, and R. Sasaki, “Method for detecting a malicious domain by using whois and dns features,” in The Third International Conference on Digital Security and Forensics (DigitalSec2016), 2016, p. 74.
[12] S. C. Hoi, J. Wang, and P. Zhao, “Libol: A library for online learning algorithms,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 495–499, 2014.
[13] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 1245–1254.
[14] “Learning to detect malicious urls,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 30, 2011.