Integrated Approach of Malicious Website Detection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comprehensive Study and Analysis of Malicious Website Detection Techniques

Nowadays, World Wide Web (WWW) surfing is becoming a risky task with the Web becoming rich in all sorts of attack. Websites are the main source of many scams, phishing attacks, identity theft, SPAM commerce and malware. Nevertheless, browsers, blacklists, and popup blockers are not enough to protect users. According to this, fast and accurate systems still to be needed with the ability to detec...

متن کامل

An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection

We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate as many security functionality as possible into the firewall. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.

متن کامل

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users

● Security is built on top of three operational aspects of computer systems: confidentiality, integrity and availability ● (Distributed) Denial of Service (DoS) is an attack on the availability of data ● The denial-of-service effect is achieved by sending messages to the target that interfere with its operation, and make it crash, reboot, freeze or do useless work ● Motivation can be both polit...

متن کامل

Unorganized Malicious Attacks Detection

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

متن کامل

A Game Theory Approach for Malicious Node Detection in MANETs

One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Communication Networks and Security

سال: 2011

ISSN: 2231-1882

DOI: 10.47893/ijcns.2011.1023