A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

Accurate and fast URL phishing detector: a convolutional neural network approach

W Wei, Q Ke, J Nowak, M Korytkowski, R Scherer… - Computer Networks, 2020 - Elsevier
Along with the development of the Internet, methods of fraud and ways to obtain important
data such as logins and passwords or personal sensitive data have evolved. One way of …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

Detecting phishing sites using chatgpt

T Koide, N Fukushi, H Nakano, D Chiba - arxiv preprint arxiv:2306.05816, 2023 - arxiv.org
The emergence of Large Language Models (LLMs), including ChatGPT, is having a
significant impact on a wide range of fields. While LLMs have been extensively researched …

Needle in a haystack: Tracking down elite phishing domains in the wild

K Tian, STK Jan, H Hu, D Yao, G Wang - Proceedings of the Internet …, 2018 - dl.acm.org
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …

Hiding in plain sight: A longitudinal study of combosquatting abuse

P Kintis, N Miramirkhani, C Lever, Y Chen… - Proceedings of the …, 2017 - dl.acm.org
Domain squatting is a common adversarial practice where attackers register domain names
that are purposefully similar to popular domains. In this work, we study a specific type of …

[PDF][PDF] Seven months' worth of mistakes: A longitudinal study of typosquatting abuse

P Agten, W Joosen, F Piessens… - Proceedings of the 22nd …, 2015 - lirias.kuleuven.be
Typosquatting is the act of purposefully registering a domain name that is a mistype of a
popular domain name. It is a concept that has been known and studied for over 15 years, yet …

Domain name system security and privacy: A contemporary survey

A Khormali, J Park, H Alasmary, A Anwar, M Saad… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …

Investigating package related security threats in software registries

Y Gu, L Ying, Y Pu, X Hu, H Chai… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Package registries host reusable code assets, allowing developers to share and reuse
packages easily, thus accelerating the software development process. Current software …