Homoglyph Attack Detection Model Using Machine Learning and Hash Function

نویسندگان

چکیده

Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting spoofing/fake site that appears to be visual clone of legitimate site. Several Unicode characters are visually identical ASCII characters. This similarity generally known as homoglyphs. Malicious adversaries utilize homoglyphs URLs and DNS domains target organizations. To reduce the risks caused phishing attacks, effective ways detecting websites urgently required. paper proposes homoglyph attack detection model combines hash function machine learning. There two phases approach. The was being trained during development phase. deployment phase involved deploying with Java interface testing outcomes through actual user interaction. results more accurate when URL hashed, any little changes can recognized. detector developed stand-alone software used initial step requesting webpage it enhances browser protects attempts. verify effectiveness, we compared proposed on several criteria existing methods. By using function, features increase overall terms accuracy, integrity, availability. experiment showed detect sites an accuracy 99.8% Random Forest, improves detection.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach

Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...

متن کامل

Emotion Detection in Persian Text; A Machine Learning Model

This study aimed to develop a computational model for recognition of emotion in Persian text as a supervised machine learning problem. We considered Pluthchik emotion model as supervised learning criteria and Support Vector Machine (SVM) as baseline classifier. We also used NRC lexicon and contextual features as training data and components of the model. One hundred selected texts including pol...

متن کامل

Collision Attack on the Waterfall Hash Function

We give a method that appears to be able to find colliding messages for the Waterfall hash function with approximately O(2) work for all hash sizes. If correct, this would show that the Waterfall hash function does not meet the required collision resistance.

متن کامل

Cyber Attack Detection and Classification Using Parallel Support Vector Machine

Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection and classification methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the fi...

متن کامل

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensor and Actuator Networks

سال: 2022

ISSN: ['2224-2708']

DOI: https://doi.org/10.3390/jsan11030054