2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) 2015
DOI: 10.1109/synasc.2015.40
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Techniques for Proactively Identifying Malicious URLs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…[137] follow another style of integration of supervised and unsupervised where first k-means clustering is performed, and the cluster ID is used as a feature to train a classifier. [138] proposed the usage of an unsupervised hashbased clustering system, wherein specific clusters were labeled as malicious or benign (based on majority of the training data).…”
Section: Other Learning Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…[137] follow another style of integration of supervised and unsupervised where first k-means clustering is performed, and the cluster ID is used as a feature to train a classifier. [138] proposed the usage of an unsupervised hashbased clustering system, wherein specific clusters were labeled as malicious or benign (based on majority of the training data).…”
Section: Other Learning Methodsmentioning
confidence: 99%
“…Similarity Learning [57], [58], [58]-[60] Unsupervised Learning [94], [137], [138] String Pattern Matching [31]- [33], [54], [88], [148], [149] (ii) Fast Detection: The detection speed is another important concern for a practical malicious URL detection system, particularly for online systems or cybersecurity applications. For example, when deploying the malicious URL detection service in online social networks like Twitter, whenever a user posts any new URL, an ideal system should be able to detect the malicious URL immediately and then block the URL and its related tweets in real time to prevent any threats and harms to public.…”
Section: A Design Principlesmentioning
confidence: 99%
“…In the Appendix, we give tables with bibliographic numbers of the papers, so that interested readers can easily find the original sources for each entry in our tables in the main part of the paper. Accuracy 28 [21], [29], [30], [34]- [36], [42], [63], [64], [69], [80] [33], [44], [53], [55], [56], [66], [79], [86], [89] [22], [48], [50]- [52], [77], [81], […”
Section: Appendixmentioning
confidence: 99%
“…Recall F-score 20 [30], [33]- [35], [47], [58]- [60], [69], [86] [22], [29], [50]- [52], [62]- [64], [70], [89] Error Rate 13 [21], [28], [34], [39], [40], [43], [49] [38], [65], [67], [73], [85], [89] Confusion Matrix a 20 [35], [43]- [46], [48], [57], [69], [76], [80], [82] [29], [50], [51], [58], [66], [78], [79], [88], [89] Area Under Curve 4 [33], [35], [50], [51] Others b 6 [42], [57],…”
Section: ] Precisionmentioning
confidence: 99%
See 1 more Smart Citation