نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

Journal: :International Journal of Research in Engineering and Technology 2014

Journal: :International Journal of Advanced Computer Science and Applications 2023

Phishing is one of the significant threats in cyber security. a form social engineering that uses e-mails with malicious websites to solicitate personal information. are growing alarming number. In this paper we propose novel machine learning approach classify phishing using Convolution Neural Networks (CNNs) use URL based features. CNNs consist stack convolution, pooling layers, and fully conn...

2017
Meike Nauta Mena B. Habib Maurice van Keulen

Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency an...

2015
Andi Fitriah Abdul Kadir Natalia Stakhanova Ali A. Ghorbani

Botnets have traditionally been seen as a threat to personal computers; however, the recent shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android mobile Operating System became the most targeted platform. In spite of rising numbers, there is a significant gap in understanding the nature of mobile botnets and their communication characteristics. In this pape...

2008
J. J. Sandvig Runa Bhaumik Maryam Ramezani Robin Burke Bamshad Mobasher

Social tagging systems provide an open platform for users to share and annotate their resources such as photos and URLs. Due to their open nature, however, these systems present a security problem. Malicious users may try to distort the system’s behavior by inserting erroneous or misleading annotations, thus altering the way in which information is presented to legitimate users. This paper addr...

2017

Typosquatting is a blackhat practice that relies on human error and low-cost domain registrations to hijack legitimate traffic from well-established websites. The technique is typically used for phishing, driving traffic towards competitors or disseminating indecent or malicious content and as such remains a concern for businesses. We take a fresh new look at this well-studied phenomenon to exp...

2016
Ammar Yahya Daeef R. Badlishah Ahmad Yasmin Yacob Nazri Bin Mohd

Phishing is a kind of attack that belongs to social engineering and this attack seeks to trick people in order to let them reveal their confidential information. Several methods are introduced to detect phishing websites by using different types of features. Unfortunately, these techniques implemented for specific attack vector such as detecting phishing emails which make implementing wide scop...

Journal: :Egyptian Informatics Journal 2022

With confusion and uncertainty ruling the world, 2020 created near-perfect conditions for cybercriminals. As businesses virtually eliminated in-person experiences, COVID-19 pandemic changed way we live caused a mass migration to digital platforms. However, this shift also made people more vulnerable cyber-crime. Victims are being targeted by attackers their credentials or financial rewards, bot...

2014
Sudarshan Kudlur Satyanarayana Keshav Sood Yuan Tao Shui Yu

The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the secur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید