Integrated Approach of Malicious Website Detection
نویسندگان
چکیده
منابع مشابه
Comprehensive Study and Analysis of Malicious Website Detection Techniques
Nowadays, World Wide Web (WWW) surfing is becoming a risky task with the Web becoming rich in all sorts of attack. Websites are the main source of many scams, phishing attacks, identity theft, SPAM commerce and malware. Nevertheless, browsers, blacklists, and popup blockers are not enough to protect users. According to this, fast and accurate systems still to be needed with the ability to detec...
متن کاملAn Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection
We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate as many security functionality as possible into the firewall. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.
متن کاملUnsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users
● Security is built on top of three operational aspects of computer systems: confidentiality, integrity and availability ● (Distributed) Denial of Service (DoS) is an attack on the availability of data ● The denial-of-service effect is achieved by sending messages to the target that interfere with its operation, and make it crash, reboot, freeze or do useless work ● Motivation can be both polit...
متن کاملUnorganized Malicious Attacks Detection
Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...
متن کاملA Game Theory Approach for Malicious Node Detection in MANETs
One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Security
سال: 2011
ISSN: 2231-1882
DOI: 10.47893/ijcns.2011.1023