Malicious URL sequence detection using event de-noising convolutional neural network
Attackers have increased the number of infected hosts by redirecting users of compromised
popular websites toward websites that exploit vulnerabilities of a browser and its plugins. To …
popular websites toward websites that exploit vulnerabilities of a browser and its plugins. To …
Detecting malicious websites by learning IP address features
Web-based malware attacks have become one of the most serious threats that need to be
addressed urgently. Several approaches that have attracted attention as promising ways of …
addressed urgently. Several approaches that have attracted attention as promising ways of …
A machine learning approach to malicious JavaScript detection using fixed length vector representation
To add more functionality and enhance usability of web applications, JavaScript (JS) is
frequently used. Even with many advantages and usefulness of JS, an annoying fact is that …
frequently used. Even with many advantages and usefulness of JS, an annoying fact is that …
Automating URL blacklist generation with similarity search approach
Modern web users may encounter a browser security threat called drive-by-download
attacks when surfing on the Internet. Drive-by-download attacks make use of exploit codes to …
attacks when surfing on the Internet. Drive-by-download attacks make use of exploit codes to …
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
M Akiyama, T Yagi, T Hariu, Y Kadobayashi - International Journal of …, 2018 - Springer
A web user who falsely accesses a compromised website is usually redirected to an
adversary's website and is forced to download malware after being exploited. Additionally …
adversary's website and is forced to download malware after being exploited. Additionally …