[go: up one dir, main page]

Kulkarni et al., 2019 - Google Patents

Phishing websites detection using machine learning

Kulkarni et al., 2019

View PDF
Document ID
11375037639942320736
Author
Kulkarni A
Brown III L
et al.
Publication year

External Links

Snippet

Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are …
Continue reading at scholarworks.uttyler.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Kulkarni et al. Phishing websites detection using machine learning
Zamir et al. Phishing web site detection using diverse machine learning algorithms
Ganju et al. Property inference attacks on fully connected neural networks using permutation invariant representations
Aljabri et al. An assessment of lexical, network, and content‐based features for detecting malicious URLs using machine learning and deep learning models
Patil et al. Malicious URLs detection using decision tree classifiers and majority voting technique
Adebayo et al. Improved malware detection model with apriori association rule and particle swarm optimization
Moorthy et al. Optimal detection of phising attack using SCA based K-NN
Nagaraj et al. Detection of phishing websites using a novel twofold ensemble model
Ross et al. Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection
Vinayakumar et al. Deep learning framework for cyber threat situational awareness based on email and url data analysis
Zhang et al. Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self‐Supervised Learning
Ross SQL injection detection using machine learning techniques and multiple data sources
Jang et al. Mal‐Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph
Abualkibash Machine learning in network security using KNIME analytics
Patil et al. Malicious web pages detection using feature selection techniques and machine learning
Vishva et al. Phisher fighter: website phishing detection system based on url and term frequency-inverse document frequency values
Ojo Improved model for detecting fake profiles in online social network: A case study of twitter
Sivanantham et al. Web Hazard Identification and Detection Using Deep Learning-A Comparative Study.
Kumar et al. A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance
Aslam et al. Phish-identifier: Machine Learning based classification of Phishing attacks
Tripathi et al. Feature selection and scaling for random forest powered malware detection system
Patil et al. Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis.
Kaibassova et al. Solving the problem of detecting phishing websites using ensemble learning models
Pithawala et al. Detecting phishing of short uniform resource locators using classification techniques
Almazmomi Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach