Kulkarni et al., 2025 - Google Patents
From ML to LLM: Evaluating the Robustness of Phishing Web Page Detection Models against Adversarial AttacksKulkarni et al., 2025
View HTML- Document ID
- 8782091238365427769
- Author
- Kulkarni A
- Balachandran V
- Divakaran D
- Das T
- Publication year
- Publication venue
- Digital Threats: Research and Practice
External Links
Snippet
Phishing attacks attempt to deceive users into stealing sensitive information, posing a significant cybersecurity threat. Advances in Machine Learning (ML) and Deep Learning (DL) have led to the development of numerous phishing web page detection solutions, but …
- 238000001514 detection method 0 title abstract description 76
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shayegani et al. | Survey of vulnerabilities in large language models revealed by adversarial attacks | |
Hu et al. | Artificial intelligence security: Threats and countermeasures | |
Tramèr et al. | Adversarial: Perceptual ad blocking meets adversarial machine learning | |
Chen et al. | Gui-squatting attack: Automated generation of android phishing apps | |
US11671448B2 (en) | Phishing detection using uniform resource locators | |
US11381598B2 (en) | Phishing detection using certificates associated with uniform resource locators | |
Parisi | Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies | |
Jeeva et al. | Intelligent phishing url detection using association rule mining | |
Abdali et al. | Securing large language models: Threats, vulnerabilities and responsible practices | |
Yang et al. | Scalable detection of promotional website defacements in black hat {SEO} campaigns | |
US20240291847A1 (en) | Security risk remediation tool | |
Kulkarni et al. | From ml to llm: Evaluating the robustness of phishing webpage detection models against adversarial attacks | |
Wu et al. | TrackerDetector: A system to detect third-party trackers through machine learning | |
Ahmad et al. | Across the spectrum in-depth review AI-based models for phishing detection | |
Mohammed et al. | HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis | |
Barik et al. | Web-based phishing URL detection model using deep learning optimization techniques | |
Trad et al. | Evaluating the efficacy of prompt-engineered large multimodal models versus fine-tuned vision transformers in image-based security applications | |
Tomassi | Data Security and Privacy Concerns for Generative AI Platforms | |
Farzand et al. | A systematic deconstruction of human-centric privacy & security threats on mobile phones | |
Mao et al. | Phishing website detection based on effective CSS features of web pages | |
Kumar et al. | A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance | |
Wapet et al. | Preventing the propagation of a new kind of illegitimate apps | |
Tian et al. | From Past to Present: A Survey of Malicious URL Detection Techniques, Datasets and Code Repositories | |
Ji et al. | Adaptive sensitive information recognition based on multimodal information inference in social networks | |
Jiang et al. | Never compromise to vulnerabilities: A comprehensive survey on ai governance |