Homoglyph Attack Detection Model Using Machine Learning and Hash Function
نویسندگان
چکیده
Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting spoofing/fake site that appears to be visual clone of legitimate site. Several Unicode characters are visually identical ASCII characters. This similarity generally known as homoglyphs. Malicious adversaries utilize homoglyphs URLs and DNS domains target organizations. To reduce the risks caused phishing attacks, effective ways detecting websites urgently required. paper proposes homoglyph attack detection model combines hash function machine learning. There two phases approach. The was being trained during development phase. deployment phase involved deploying with Java interface testing outcomes through actual user interaction. results more accurate when URL hashed, any little changes can recognized. detector developed stand-alone software used initial step requesting webpage it enhances browser protects attempts. verify effectiveness, we compared proposed on several criteria existing methods. By using function, features increase overall terms accuracy, integrity, availability. experiment showed detect sites an accuracy 99.8% Random Forest, improves detection.
منابع مشابه
Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach
Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...
متن کاملEmotion Detection in Persian Text; A Machine Learning Model
This study aimed to develop a computational model for recognition of emotion in Persian text as a supervised machine learning problem. We considered Pluthchik emotion model as supervised learning criteria and Support Vector Machine (SVM) as baseline classifier. We also used NRC lexicon and contextual features as training data and components of the model. One hundred selected texts including pol...
متن کاملCollision Attack on the Waterfall Hash Function
We give a method that appears to be able to find colliding messages for the Waterfall hash function with approximately O(2) work for all hash sizes. If correct, this would show that the Waterfall hash function does not meet the required collision resistance.
متن کاملCyber Attack Detection and Classification Using Parallel Support Vector Machine
Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection and classification methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the fi...
متن کاملAn Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensor and Actuator Networks
سال: 2022
ISSN: ['2224-2708']
DOI: https://doi.org/10.3390/jsan11030054