2020
DOI: 10.1007/978-3-030-41025-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious Websites by Query Templates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The method proposed by Kaneko et al [10] named "Detecting Malicious Websites by Query Templates" used the machine learning algorithm DBSCAN to cluster malicious URLs and benign URLs. In the segmentation step, they chose a different way to divide URLs is that use all delimiters into URLs.…”
Section: The Segmentation Methods Of the Malicious Urls Detection Res...mentioning
confidence: 99%
“…The method proposed by Kaneko et al [10] named "Detecting Malicious Websites by Query Templates" used the machine learning algorithm DBSCAN to cluster malicious URLs and benign URLs. In the segmentation step, they chose a different way to divide URLs is that use all delimiters into URLs.…”
Section: The Segmentation Methods Of the Malicious Urls Detection Res...mentioning
confidence: 99%
“…The method proposed by Kaneko et al [3] named "Detecting Malicious Websites by Query Templates" used the machine learning algorithm DBSCAN to cluster malicious URLs and benign URLs. In the segmentation step, they chose a different way to divide URLs is that use all delimiters into URLs.…”
Section: Detecting Malicious Websites By Query Templatesmentioning
confidence: 99%
“…The first one, named the Alphabet method, means that splits the URL on a per-character basis and as a representative of the context-agnostic segmentation methods. The second one, Token method, means that as Kaneko's method [3], split the URL by all separators into URLs and as a representative of the contextconsidering segmentation methods. As mentioned above, refer to Yuan's segmentation method of URL structure, in order to keep the URL structure, we divided the URL into 5 parts with fixed lengths.…”
Section: Process Of Segmentationmentioning
confidence: 99%
See 1 more Smart Citation