Identifying the Attack and Malicious Links in Net

Authors(3) :-M. SatishKumar, M. Eswar, P. Hemalatha

Fraudulent behaviours in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. Malicious URLs are wide wont to mount varied cyber attacks together with spamming, phishing and mal- ware. Detection of malicious URLs and identification of threat varieties square measure vital to thwart these attacks. Knowing the kind of a threat allows estimation of severity of the attack and helps adopt a good countermeasure. Existing ways usually sight malicious URLs of one attack kind. During this paper, we have a tendency to propose technique using machine learning to sight malicious URLs of all the popular attack varieties and determine the character of attack a malicious uniform resource locator tries to launch. Our method uses a range of discriminative options together with textual properties, link structures, webpage contents, DNS information, and network traffic. Several of those features square measure novel and extremely effective.

Authors and Affiliations

M. SatishKumar
Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
M. Eswar
Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
P. Hemalatha
Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India

Malicious URL, attacks, cyber crimes.

  1. CHENETTE, S. The ultimate deobfuscator. http: //securitylabs.websense.com/content/Blogs/3198.aspx, 2008.
  2. CHUNG, Y.-J., TOYODA, M., AND KITSUREGAWA, M. Identifying spam link generators for monitoring emerging web spam. In WICOW: Proceedings of the 4th workshop on Information credibility(2010).
  3. CISCO IRONPORT. IronPortWeb Reputation: Protect and defend against URL-based threat. http://www.ironport.com.
  4. CORTES, C., AND VAPNIK, V. Support vector networks. Machine Learning (1995), 273–297.
  5. CURL LIBRARY. Free and easy-to-use client-side url transfer library. http://curl.haxx.se/, 1997.
  6. DMOZ. Netscape open directory project. http://www. dmoz.org.
  7. DNS-BH. Malware prevention through domain blocking. http://www.malwaredomains.com.
  8. FETTE, I., SADEH, N., AND TOMASIC, A. Learning to detect phishing emails. In WWW: Proceedings of the international conference on World Wide Web (2007).
  9. GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and measurement of phishing attacks. In WORM: Proceedings of the Workshop on Rapid Malcode (2007).
  10. GEOIP API, MAXMIND. Open source APIs and database for geological information. http://www.maxmind.com.
  11. GYO NGYI, Z., AND GARCIA-MOLINA, H. Link spam alliances. In VLDB: Proceedings of the international conference on Very Large Data Bases (2005).
  12. GYONGYI, Z., AND GARCIA-MOLINA, H. Web spam taxonomy, 2005
  13. HOU, Y.-T., CHANG, Y., CHEN, T., LAIH, C.-S., AND CHEN, C.-M. Malicious web content detection by machine learning. Expert Systems with Applications (2010), 55–60.
  14. JWSPAMSPY. E-mail spam filter for MicrosoftWindows. http: //www.jwspamspy.net.
  15. LEE, K., CAVERLEE, J., AND WEBB, S. Uncovering social spammers: social honeypots + machine learning. In ACM SIGIR: Proceeding of the international conference on Research and development in Information Retrieval (2010).
  16. MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In KDD: Proceedings of the international conference on Knowledge Discovery and Data mining (2009).
  17. MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Identifying suspicious URLs: an application of large-scale online learning. In ICML: Proceedings of the International Conference on Machine Learning (2009).
  18. MCAFEE SITEADVISOR. Service for reporting the safety of web sites. http://www.siteadvisor.com/.
  19. MCGRATH, D. K., AND GUPTA, M. Behind phishing: An examination of phisher modi operandi. In LEET: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008).
  20. MOORE, T., CLAYTON, R., AND STERN, H. Temporal correlations between spam and phishing websites. In LEET: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2009).

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 442-445
Manuscript Number : CSEIT1833411
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. SatishKumar, M. Eswar, P. Hemalatha, "Identifying the Attack and Malicious Links in Net", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.442-445, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833411

Article Preview

Follow Us

Contact Us