Kulkarni et al., 2019 - Google Patents
Phishing websites detection using machine learningKulkarni et al., 2019
View PDF- Document ID
- 11375037639942320736
- Author
- Kulkarni A
- Brown III L
- et al.
- Publication year
External Links
Snippet
Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kulkarni et al. | Phishing websites detection using machine learning | |
Zamir et al. | Phishing web site detection using diverse machine learning algorithms | |
Ganju et al. | Property inference attacks on fully connected neural networks using permutation invariant representations | |
Aljabri et al. | An assessment of lexical, network, and content‐based features for detecting malicious URLs using machine learning and deep learning models | |
Patil et al. | Malicious URLs detection using decision tree classifiers and majority voting technique | |
Adebayo et al. | Improved malware detection model with apriori association rule and particle swarm optimization | |
Moorthy et al. | Optimal detection of phising attack using SCA based K-NN | |
Nagaraj et al. | Detection of phishing websites using a novel twofold ensemble model | |
Ross et al. | Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection | |
Vinayakumar et al. | Deep learning framework for cyber threat situational awareness based on email and url data analysis | |
Zhang et al. | Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self‐Supervised Learning | |
Ross | SQL injection detection using machine learning techniques and multiple data sources | |
Jang et al. | Mal‐Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph | |
Abualkibash | Machine learning in network security using KNIME analytics | |
Patil et al. | Malicious web pages detection using feature selection techniques and machine learning | |
Vishva et al. | Phisher fighter: website phishing detection system based on url and term frequency-inverse document frequency values | |
Ojo | Improved model for detecting fake profiles in online social network: A case study of twitter | |
Sivanantham et al. | Web Hazard Identification and Detection Using Deep Learning-A Comparative Study. | |
Kumar et al. | A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance | |
Aslam et al. | Phish-identifier: Machine Learning based classification of Phishing attacks | |
Tripathi et al. | Feature selection and scaling for random forest powered malware detection system | |
Patil et al. | Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. | |
Kaibassova et al. | Solving the problem of detecting phishing websites using ensemble learning models | |
Pithawala et al. | Detecting phishing of short uniform resource locators using classification techniques | |
Almazmomi | Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach |