Secure Real-Time Computational Intelligence System Against Malicious QR Code Links
نویسندگان
چکیده
Web attackers aim to propagate malicious links using various techniques deceive users. They attempt control victims’ devices or obtain their passwords remotely, thereby acquiring access bank accounts, financial transactions, private and sensitive information they trade via the Internet. QR codes are accessible, free, easy use, can be scanned through several free apps on smartphones. As there is no standard structure authentication phase in code generation, such vulnerable suspicious online content embedding, i.e., phishing, Cross-Site Scripting (XSS), malware. Many studies have highlighted attacks that may perpetrated barcodes, some security countermeasures. Several of these solutions limited link detection methods require knowledge cryptographic techniques. This study’s main objective detect URLs embedded codes. A dataset 90 000 benign was collected from resources, lexical properties were extracted. Two computational intelligence models, fuzzy logic multilayer perceptron artificial neural network (MLP-ANN), applied compared. An MLP-ANN identified as best classifier for detecting URLs, a proactive, secure, real-time barcode scanner implementation (BarCI ) against proposed based this classifier. The results demonstrate approach enables efficient attack with 82.9% accuracy
منابع مشابه
Review of a Real-Time Infectious Waste Management System Using QR Code
In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste mat...
متن کاملReal - Time Real - World Visual Classi cation { Making Computational Intelligence
An Intelligent Inspection Engine (IIE) for classiication of non-regular shaped objects from images is described and evaluated using real-world data from a waste package sorting application. The entire system is self-organizing. Principal component analysis and additional a priori knowledge on color properties are used for feature extraction. As classiiers growing neural networks provide robustn...
متن کاملIntelligent Defense against Malicious JavaScript Code
JavaScript is a popular scripting language for creating dynamic and interactive web pages. Unfortunately, JavaScript also provides the ground for web-based attacks that exploit vulnerabilities in web browsers and unnoticeably infect users with malicious software. Regular security tools, such as anti-virus scanners, increasingly fail to fend off this threat, as they are unable to cope with the r...
متن کاملAgent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e.g. worms) and related threats. Agents are not only used as a system-integration platform, but we use modern agent approaches to trust modeling and distributed task allocation to efficiently detect and also counter th...
متن کاملMalicious Code *
Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system therefore is a potential attack on any other system that it may interact with, which further magn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computers Communications & Control
سال: 2021
ISSN: ['1841-9844', '1841-9836']
DOI: https://doi.org/10.15837/ijccc.2021.3.4186