نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

Journal: :Journal of information processing 2022

URL shortening services enable us to shorten or simplify URLs. Ad-based display advertisements users who access short URLs and reward creators. However, ad-based have specific security risks that without ads do not, such as displaying malicious users. In this study, we reveal previously unknown of these caused by users' behaviors. We conducted a comprehensive measurement services. First, access...

2010
Alexander Neumann Johannes Barnickel Ulrike Meyer

URL shortening services replace long URLs with shorter ones and subsequently redirect all requests for the shortened URL to the original long URL. In this paper we discuss and empirically analyze security and privacy risks caused by the use of URL shortening services. We empirically determine the most popular URL shortening services currently used on Twitter and analyze these with respect to ma...

2015
Michal Kruczkowski Ewa Niewiadomska-Szynkiewicz Adam Kozakiewicz

The classification of the massive amount of malicious software variants into families is a challenging problem faced by the the network community. In this paper (The work was supported by the EU FP7 grant No. 608522 (NECOMA) and "Information technologies: Research and their interdisciplinary applications", POKL.04.01.01-00-051/10-00.) we introduce a hybrid technique combining a frequent pattern...

Journal: :IEEE Access 2022

Phishing is a social engineering cyberattack where criminals deceive users to obtain their credentials through login form that submits the data malicious server. In this paper, we compare machine learning and deep techniques present method capable of detecting phishing websites URL analysis. most current state-of-the-art solutions dealing with detection, legitimate class made up homepages witho...

2014
Aruna. Dongari

Twitter is a one of the most popular social networking site used by millions of people in the world. As the usage growing rapidly in the recent years, attackers are concentrating more on twitter to gather personnel data and made changes to. It leads to the diminishing the privacy of the users. The attacker tweets suspicious URLs on the user’s timeline. These URLs contains spam, phishing and mal...

2008
Niels Provos Panayiotis Mavrommatis Moheeb Abu Rajab Fabian Monrose

As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provide a detailed study of the pervasiveness of so-called drive-by downloads on the Internet. Driveby downloads are caused by URLs that attempt to exploit their visitors and cause malware to be installed and run automatica...

Journal: :Jurnal sains dan informatika: research of science and informatic 2023

URLs are very much on the network of computer systems. Moreover, nowadays all activities use an online system. Starting from social media, and marketplaces to group chat applications. An early prevention system malicious URL attacks is needed counteract large number circulating in Previously detection based blacklisting UURLs Previously, Blacklisting Heuristic could not recognize new type witho...

2010
Jack W. Stokes Reid Andersen Christian Seifert Kumar Chellapilla

In this paper, we propose WebCop to identify malicious web pages and neighborhoods of malware on the internet. Using a bottom-up approach, telemetry data from commercial Anti-Malware (AM) clients running on millions of computers first identify malware distribution sites hosting malicious executables on the web. Next, traversing hyperlinks in a web graph constructed from a commercial search engi...

Journal: :Iet Information Security 2023

Phishing attacks have become one of the powerful sources for cyber criminals to impose various forms security in which fake website Uniform Resource Locators (URL) are circulated around Internet community form email, messages etc., order deceive users, resulting loss their valuable assets. The phishing URLs predicted using several blacklist-based traditional detection techniques. However, numer...

Journal: :NATURENGS MTU Journal of Engineering and Natural Sciences Malatya Turgut Ozal University 2022

With the developing technology, issue of cyber security has become one most common and current issues in recent years. Spam URLs are dangerous for cybersecurity. widely used attacks to defraud users. These cause users suffer monetary losses, steal private information, install malicious software on their devices. It is very important detect such threats promptly take precautions against these th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید