2013
DOI: 10.1007/978-3-642-36516-4_24
|View full text |Cite
|
Sign up to set email alerts
|

PhishLive: A View of Phishing and Malware Attacks from an Edge Router

Abstract: Malicious website attacks, including phishing, malware, and drive-by downloads have become a huge security threat to today's Internet. Various studies have been conducted to explore approaches to prevent users from being attacked by malicious websites. However, no studies to date exist on the prevalence of and temporal characteristics of such traffic. In this paper, we developed the PhishLive system to study the behavior of malicious website attacks on users and hosts of the campus network of a large Universit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Unlike detection oriented phishing approaches, PhishLive [43] searches for malicious URL presence and frequency within the traffic of an edge network in order to be able to scale detection tools such as middleboxes. Therefore, the authors particularly focused on timing characteristics and location of malicious URL access.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike detection oriented phishing approaches, PhishLive [43] searches for malicious URL presence and frequency within the traffic of an edge network in order to be able to scale detection tools such as middleboxes. Therefore, the authors particularly focused on timing characteristics and location of malicious URL access.…”
Section: Related Workmentioning
confidence: 99%