2018 International Symposium on Networks, Computers and Communications (ISNCC) 2018
DOI: 10.1109/isncc.2018.8530984
|View full text |Cite
|
Sign up to set email alerts
|

A Fault Tolerant Approach for Malicious URL Filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…These domains are used for phishing [2][3][4][5][6] (e.g., spear phishing), Command and Control (C&C) [7] and a vast set of virus and malware [8] attacks. Therefore, the ability to identify a malicious domain in advance is a massive game-changer [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26]. A common way of identifying malicious/compromised domains is to collect information about the domain names (alphanumeric characters) and network information (such as DNS and passive DNS data).…”
Section: Introductionmentioning
confidence: 99%
“…These domains are used for phishing [2][3][4][5][6] (e.g., spear phishing), Command and Control (C&C) [7] and a vast set of virus and malware [8] attacks. Therefore, the ability to identify a malicious domain in advance is a massive game-changer [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26]. A common way of identifying malicious/compromised domains is to collect information about the domain names (alphanumeric characters) and network information (such as DNS and passive DNS data).…”
Section: Introductionmentioning
confidence: 99%
“…In such attacks, the adversary can utilize a set of domains and IP addresses to orchestrate sophisticated attacks [56,12]. Therefore, the ability to identify a malicious domain in advance is a massive game-changer [11,12,14,15,18,20,22,25,26,27,37,45,49,56,60,61,64].…”
Section: Introductionmentioning
confidence: 99%