Malicious website identification using design attribute learning
نویسندگان
چکیده
Malicious websites pose a challenging cybersecurity threat. Traditional tools for detecting malicious rely heavily on industry-specific domain knowledge, are maintained by large-scale research operations, and result in never-ending attacker–defender dynamic. need to balance two opposing requirements successfully function: escaping malware detection while attracting visitors. This fundamental conflict can be leveraged create robust sustainable approach based the extraction, analysis, learning of design attributes website identification. In this paper, we propose next-generation algorithm extended attribute that learns analyzes web page structures, content, appearances, reputation detect websites. Results from experiment was conducted more than 35,000 suggest proposed effectively detects 83% all maintaining low false-positive rate 2%. addition, method incorporate user feedback flag new suspicious thus effective against zero-day attacks.
منابع مشابه
Malicious Code Detection Using Active Learning
The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic and other malicious purposes. Currently, dozens of new malicious codes are created every day and this number is expected to increase in the coming years. Today’s signature-based anti-viruses and heuristic-based methods are accurate, but cannot detect new malicious code. R...
متن کاملMalicious JavaScript detection using machine learning
JavaScript has become a ubiquitous Web technology that enables interactive and dynamic Web sites. The widespread adoption, along with some of its properties allowing authors to easily obfuscate their code, make JavaScript an interesting venue for malware authors. In this survey paper, we discuss some of the difficulties in dealing with malicious JavaScript code, and go through some recent appro...
متن کاملAdaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visitor’s needs and no additional navigation is necessary. In other cases, however, the visitor is better served by content located elsewhere on the site found by navigating links. If the path between a user’s current loca...
متن کاملUsing Server Logfiles to Improve Website Design
To provide appropriate web-based information in an accessible form, librarians need to know how users visualize the organization of information within the system and how they search for the information they need. The Internet has been compared to a very large library before classification schemes were devised. The amount of information is incredible, but trying to find relevant answers to quest...
متن کاملUnsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users
● Security is built on top of three operational aspects of computer systems: confidentiality, integrity and availability ● (Distributed) Denial of Service (DoS) is an attack on the availability of data ● The denial-of-service effect is achieved by sending messages to the target that interfere with its operation, and make it crash, reboot, freeze or do useless work ● Motivation can be both polit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2023
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-023-00686-y