2017
DOI: 10.1007/978-981-10-5547-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Suspicious URLs Filtering Using Optimal RT-PFL: A Novel Feature Selection Based Web URL Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…In which the URL logs of users accessing a domain name are used as the research object, the performance characteristics of malicious access are mined from multi-dimensions, and the sample markers with inaccurate categories near the critical points in the Gaussian mixed clustering classification results are modified with manual assistance, and then the S4VM algorithm is used to output a detection model that can identify malicious access, and based on the proposed identification model, URL-based malicious access Based on the proposed identification model, a URL-based malicious access identification system is designed and implemented. Most of the past malicious URL detections are based on blacklisting techniques [13][14] , reputation systems [15] , host features [16][17] , honeypot techniques [18] , lexical features and intrusion detection techniques [19] .…”
Section: Current Status Of Domestic and International Researchmentioning
confidence: 99%
“…In which the URL logs of users accessing a domain name are used as the research object, the performance characteristics of malicious access are mined from multi-dimensions, and the sample markers with inaccurate categories near the critical points in the Gaussian mixed clustering classification results are modified with manual assistance, and then the S4VM algorithm is used to output a detection model that can identify malicious access, and based on the proposed identification model, URL-based malicious access Based on the proposed identification model, a URL-based malicious access identification system is designed and implemented. Most of the past malicious URL detections are based on blacklisting techniques [13][14] , reputation systems [15] , host features [16][17] , honeypot techniques [18] , lexical features and intrusion detection techniques [19] .…”
Section: Current Status Of Domestic and International Researchmentioning
confidence: 99%
“…A growing number of cyber-thieves are taking advantage of these same technologies to deceive us and steal our personal information, which is unfortunate for us. The authors of this paper [6] propose a strategy termed optimal RT-PFL for distinguishing harmful URLs identified on websites from non-malicious URLs, which they describe as follows: In order to generate feature components, the data set should be encoded as both lexical and host functions for the URL in order to construct feature components. The function extraction method is responsible for extracting certain characteristics.…”
Section: Related Workmentioning
confidence: 99%