Identifying the Attack and Malicious Links in Net

Authors

  • M. SatishKumar  Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
  • M. Eswar  Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
  • P. Hemalatha  Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India

Keywords:

Malicious URL, attacks, cyber crimes.

Abstract

Fraudulent behaviours in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. Malicious URLs are wide wont to mount varied cyber attacks together with spamming, phishing and mal- ware. Detection of malicious URLs and identification of threat varieties square measure vital to thwart these attacks. Knowing the kind of a threat allows estimation of severity of the attack and helps adopt a good countermeasure. Existing ways usually sight malicious URLs of one attack kind. During this paper, we have a tendency to propose technique using machine learning to sight malicious URLs of all the popular attack varieties and determine the character of attack a malicious uniform resource locator tries to launch. Our method uses a range of discriminative options together with textual properties, link structures, webpage contents, DNS information, and network traffic. Several of those features square measure novel and extremely effective.

References

  1. CHENETTE, S. The ultimate deobfuscator. http: //securitylabs.websense.com/content/Blogs/3198.aspx, 2008.
  2. CHUNG, Y.-J., TOYODA, M., AND KITSUREGAWA, M. Identifying spam link generators for monitoring emerging web spam. In WICOW: Proceedings of the 4th workshop on Information credibility(2010).
  3. CISCO IRONPORT. IronPortWeb Reputation: Protect and defend against URL-based threat. http://www.ironport.com.
  4. CORTES, C., AND VAPNIK, V. Support vector networks. Machine Learning (1995), 273–297.
  5. CURL LIBRARY. Free and easy-to-use client-side url transfer library. http://curl.haxx.se/, 1997.
  6. DMOZ. Netscape open directory project. http://www. dmoz.org.
  7. DNS-BH. Malware prevention through domain blocking. http://www.malwaredomains.com.
  8. FETTE, I., SADEH, N., AND TOMASIC, A. Learning to detect phishing emails. In WWW: Proceedings of the international conference on World Wide Web (2007).
  9. GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and measurement of phishing attacks. In WORM: Proceedings of the Workshop on Rapid Malcode (2007).
  10. GEOIP API, MAXMIND. Open source APIs and database for geological information. http://www.maxmind.com.
  11. GYO NGYI, Z., AND GARCIA-MOLINA, H. Link spam alliances. In VLDB: Proceedings of the international conference on Very Large Data Bases (2005).
  12. GYONGYI, Z., AND GARCIA-MOLINA, H. Web spam taxonomy, 2005
  13. HOU, Y.-T., CHANG, Y., CHEN, T., LAIH, C.-S., AND CHEN, C.-M. Malicious web content detection by machine learning. Expert Systems with Applications (2010), 55–60.
  14. JWSPAMSPY. E-mail spam filter for MicrosoftWindows. http: //www.jwspamspy.net.
  15. LEE, K., CAVERLEE, J., AND WEBB, S. Uncovering social spammers: social honeypots + machine learning. In ACM SIGIR: Proceeding of the international conference on Research and development in Information Retrieval (2010).
  16. MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In KDD: Proceedings of the international conference on Knowledge Discovery and Data mining (2009).
  17. MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Identifying suspicious URLs: an application of large-scale online learning. In ICML: Proceedings of the International Conference on Machine Learning (2009).
  18. MCAFEE SITEADVISOR. Service for reporting the safety of web sites. http://www.siteadvisor.com/.
  19. MCGRATH, D. K., AND GUPTA, M. Behind phishing: An examination of phisher modi operandi. In LEET: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008).
  20. MOORE, T., CLAYTON, R., AND STERN, H. Temporal correlations between spam and phishing websites. In LEET: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2009).

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. SatishKumar, M. Eswar, P. Hemalatha, " Identifying the Attack and Malicious Links in Net, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.442-445, March-April-2018.