نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

Journal: :CoRR 2014
Neha Gupta Ponnurangam Kumaraguru

Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With ...

2014
Neha Gupta Vinayak Naik Sachin Gaur

Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening gained a lot of traction. URL shorteners take as input a long URL and give a short URL with the same landing page in return. With ...

2012
Max-Emanuel Maurer Lukas Höfer

Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks, classical blacklist based approaches are not su cient to protect online users. While attackers manage to achieve high similarity between original and fraudulent websites, this fact can also be used for attack detection. In many cases attackers try to make the Internet address (URL) from a website look s...

2005
Igor G. Muttik

Traditionally, viruses and other malware were distributed using push techniques – viruses directly or malware authors actively distributed copies around. With the exception of auto-executing worms this method of distribution requires user intervention – a user has to click on an email attachment or launch a program. And users have been told for years to be very cautious about all unsolicited em...

2013
Christoph Kerschbaumer Eric Hennigan Per Larsen Stefan Brunthaler Michael Franz

The widespread use of JavaScript (JS) as the dominant web programming language opens the door to attacks such as Cross Site Scripting that steal sensitive information from users. Information flow tracking successfully addresses current browser security shortcomings, but current implementations incur a significant runtime overhead cost that prevents adoption. We present a novel approach to infor...

Journal: :Security and Communication Networks 2015
Youngsang Shin Steven Myers Minaxi Gupta Predrag Radivojac

Web spammers have taken note of the popularity of public forums such as blogs, wikis, webboards, and guestbooks. They are now exploiting them with the purpose of driving traffic to their malicious or fraudulent websites, such as those used for phishing, distributing malware, or selling counterfeit pharmaceuticals. A popular technique they use is to spam these forums with URLs to their spam webs...

2014
Daoyuan Wu Rocky K. C. Chang

Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtai...

2017
V. M. Thakare

— Pattern classification is a branch of machine learning that focuses on recognition of patterns and regularities in data. In adversarial applications like biometric authentication, spam filtering, network intrusion detection the pattern classification systems are used. Extending pattern classification theory and design methods to adversarial environment is thus a novel and very relevant resear...

2017
Abdullah J. Alzahrani Ali A. Ghorbani A. A. Ghorbani

Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly. Using mobile botnets, attackers concentrate on reliable attack vectors such as SMS messages. Short Message Service (SMS) has been increasingly targeted by a number of malicious applications (“apps”) that have the ability to abuse SMS features in order to ...

Journal: :IEEE Transactions on Network and Service Management 2023

Malicious advertisement URLs pose a security risk since they are the source of cyber-attacks, and need to address this issue is growing in both industry academia. Several attempts have been made recent years for malicious URL detection using machine learning (ML). The most widely used techniques extract linguistic features string like bag-of-words (BoW) before applying ML model. Existing requir...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید