2012
DOI: 10.4304/jetwi.4.2.128-133
|View full text |Cite
|
Sign up to set email alerts
|

MALURLS: A Lightweight Malicious Website Classification Based on URL Features

Abstract:

Surfing the World Wide Web (WWW) is becoming a dangerous everyday task with the Web becoming rich in all sorts of attacks. Websites are a major source of many scams, phishing attacks, identity theft, SPAM commerce and malwares. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…To further emphasize, there are studies which display more accurate and logical representations of their JavaScript feature sets. Studies [33][34][35][36] are of varying times and datasets which plot distributions and t-SNE plots of their JavaScript features, which count deobfuscated code length, number of events and various vector embedding representations. These features are quite similar to the ones considered in this study, which allows us to benchmark the extent of the bias.…”
Section: Feature Inspection and Experimental Resultsmentioning
confidence: 99%
“…To further emphasize, there are studies which display more accurate and logical representations of their JavaScript feature sets. Studies [33][34][35][36] are of varying times and datasets which plot distributions and t-SNE plots of their JavaScript features, which count deobfuscated code length, number of events and various vector embedding representations. These features are quite similar to the ones considered in this study, which allows us to benchmark the extent of the bias.…”
Section: Feature Inspection and Experimental Resultsmentioning
confidence: 99%
“…For this work ( § IV) we surveyed several classification methods, highlighting those that could potentially be used for the Booters case, named: Euclidean distance [19], [24], Squared Euclidean distance [22], Manhattan distance [20], Fractional distance [19], [23], Cosine distance [20], K-Nearest Neighbors [21], [25], [26], and Naive Bayes [14], [15], [25], [13]. From all the studied methods Support Vector [27], [28], Hamming distance [29] and Genetic Algorithm [30] were not tested in our classification investigation. However, we consider these three methods as a future work opportunity to improve our classification accuracy.…”
Section: B Towards the Best Booter Classification Methodsmentioning
confidence: 99%
“…This type of attack redirects the user to a malicious website that has been altered by hackers in one or more aspects, such as its visual appearance or some of the site's contents. Hacktivists strive to take down a website for several reasons [13]. This form of action occurs when the attackers discover the vulnerabilities of the website and utilize those vulnerabilities to compromise the website and modify the content on the web page without the owner's authorization, which is technically known as penetrating a website [11].…”
Section: ) Defacement Url Attacksmentioning
confidence: 99%