2022
DOI: 10.32604/iasc.2022.020229
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

Abstract: A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously kn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“… Exec, Search, and Link functions: we searched for the presence of these further suspicious functions used by attackers in JavaScript code in the content features and stored its count in new features as numerical attributes. Total count of the suspicious functions: since all the above-mentioned functions are used by attackers for cross-site scripting and malware distribution [ 12 ], we added up the counts of all these functions that were present in the JavaScript code in the content features and stored its final count in a new feature called count_all_functions as a numerical attribute. Presence of Windows.open function: the Windows.open functions are generally used for ads popups and can be used to inject attacks on malicious sites.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“… Exec, Search, and Link functions: we searched for the presence of these further suspicious functions used by attackers in JavaScript code in the content features and stored its count in new features as numerical attributes. Total count of the suspicious functions: since all the above-mentioned functions are used by attackers for cross-site scripting and malware distribution [ 12 ], we added up the counts of all these functions that were present in the JavaScript code in the content features and stored its final count in a new feature called count_all_functions as a numerical attribute. Presence of Windows.open function: the Windows.open functions are generally used for ads popups and can be used to inject attacks on malicious sites.…”
Section: Methodsmentioning
confidence: 99%
“…Total count of the suspicious functions: since all the above-mentioned functions are used by attackers for cross-site scripting and malware distribution [ 12 ], we added up the counts of all these functions that were present in the JavaScript code in the content features and stored its final count in a new feature called count_all_functions as a numerical attribute.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation