نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

2015
Qilang Yang Dimitrios Damopoulos Georgios Portokalidis

A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in various ways, including through spam delivered over email and instant messages, and by links injected in search engines and popular benign websites. In response to such attacks, many initiatives, such as Google’s Safe Browsing, are ...

2017
Masayuki Murata Kohei Yamanishi

Many hosts are still infected by drive-by download attacks despite the efforts of many security researchers and venders. In the drive-by download attacks, the attackers maliciously change popular web sites. Then, the users are redirected via the redirect URLs to the exploit URLs. At the exploit URLs, an exploit code is executed, and malware is downloaded from malware distribution URLs [1]. By u...

Journal: :Future Internet 2022

In today’s world, phishing attacks are gradually increasing, resulting in individuals losing valuables, assets, personal information, etc., to unauthorized parties. phishing, attackers craft malicious websites disguised as well-known, legitimate sites and send them steal information other related private details. Therefore, an efficient accurate method is required determine whether a website ma...

2015
Naghmeh Moradpoor Sheykhkanloo

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of birth) to more sensitive data (e.g. password, pin code, and credit card information). Losing data, disclosing confidential information or even chang...

2014
S. Mamatha C. Rajendra

Twitter is a hugely well-liked famous social network where people exchanges messages of 140 characters called tweets. Because of short content size, and use of URL, it is difficult to detect phishing on Twitter unlike emails. Ease of information exchange large audience makes Twitter as a popular medium to spread external content like articles, videos, and photographs by embedding URLs in tweets...

2014

Twitter, a famous social networking site where thousands of users use it to tweet to the world, is prone to spam, phishing, and malware distribution. Tweets are the atomic building blocks of Twitter, 140-character status updates with additional associated metadata. People tweet for a variety of reasons about a multitude of topics. Traditional spam detection scheme for twitter are ineffective ag...

2012
Sangho Lee Jong Kim

Twitter can suffer from malicious tweets containing suspicious URLs for spam, phishing, and malware distribution. Previous Twitter spam detection schemes have used account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. Malicious users, however, can easily fabricate account features. Moreover, extracting relation fea...

Journal: :CoRR 2015
Prateek Dewan Ponnurangam Kumaraguru

Facebook is the world’s largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine d...

Journal: :Lecture Notes in Computer Science 2021

We investigate the link sharing behavior of Twitter users following temporary halt AstraZeneca COVID-19 vaccine development in September 2020. During this period, we show presence malicious and low credibility information sources shared on messages multiple languages. The URLs, often shortened forms, are increasingly hosted content delivery networks cloud hosting infrastructures not only to imp...

Journal: :Computers, materials & continua 2023

Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded email or Twitter used to lure vulnerable internet users implement malicious data their systems. This may result compromised of the systems, scams, other such cyberattacks. These attacks hijack huge quantit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید