Detecting attacks and Fraud links in Google Play

Authors

  • M. Neeraja  Student, Department of Computer Science ,Sri Venkateswara University.
  • Dr. M. Sreedevi  Assistant Professor , Department of Computer Science ,Sri Venkateswara University.

Keywords:

Malicious URL, phising website, benign URL

Abstract

Malicious URLs are wide accustomed mount numerous cyber attacks together with spamming, phishing and malware. Detection of malicious URLs and identification of threat varieties area unit important to thwart these attacks. Knowing the kind of a threat allows estimation of severity of the attack and helps adopt an efficient countermeasure. Existing strategies generally sight malicious URLs of one attack kind. during this paper, we tend to propose technique using machine learning to sight malicious URLs of all the popular attack varieties and establish the character of attack a malicious URL makes an attempt to launch. Our method uses a spread of discriminative options together with textual properties, link structures, webpage contents, DNS information, and network traffic. several of those features area unit novel and extremely effective. Our experimental studies with forty,000 benign URLs and thirty two,000 malicious URLs obtained from real-life web sources show that our technique delivers a superior performance: the accuracy was over ninety eight in police work malicious URLs and over 93% in characteristic attack varieties. we tend to conjointly report our studies on the effectiveness of every cluster of discriminative features, and discuss their evadability.

References

  1. AHA, D. W. Lazy learning: Special issue editorial. Artifiial Intelligence Review (1997), 7–10.
  2. ALEXA. The web information company. http://www. alexa.com, 1996.
  3. CASTILLO, C., DONATO, D., BECCHETTI, L., BOLDI, P., LEONARDI, S., SANTINI, M., AND VIGNA, S. A reference collection for web spam. SIGIR Forum 40, 2 (2006), 11–24.
  4. CASTILLO, C., DONATO, D., GIONIS, A., MURDOCK, V., AND SILVESTRI, F. Know your neighbors: web spam detection using the web topology. In ACM SIGIR: Proceedings of the conference on Research and development in Information Retrieval (2007).
  5. CHENETTE, S. The ultimate deobfuscator. http: //securitylabs.websense.com/content/Blogs/ 3198.aspx, 2008.
  6. CHUNG, Y.-J., TOYODA, M., AND KITSUREGAWA, M. Identifying spam link generators for monitoring emerging web spam. In WICOW: Proceedings of the 4th workshop on Information credibility (2010).
  7. CISCO IRONPORT. IronPortWeb Reputation: Protect and defend against URL-based threat. http://www.ironport.com.
  8. CORTES, C., AND VAPNIK, V. Support vector networks. Machine Learning (1995), 273–297.
  9. CURL LIBRARY. Free and easy-to-use client-side url transfer library. http://curl.haxx.se/, 1997.
  10. DMOZ. Netscape open directory project. http://www. dmoz.org.
  11. DNS-BH. Malware prevention through domain blocking. http://www.malwaredomains.com.
  12. FETTE, I., SADEH, N., AND TOMASIC, A. Learning to detect phishing emails. In WWW: Proceedings of the international conference on World Wide Web (2007).
  13. GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and measurement of phishing attacks. In WORM: Proceedings of the Workshop on Rapid Malcode (2007).
  14. GEOIP API, MAXMIND. Open source APIs and database for geological information. http://www.maxmind.com.
  15. GYO NGYI, Z., AND GARCIA-MOLINA, H. Link spam alliances. In VLDB: Proceedings of the international conference on Very Large Data Bases (2005).

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Neeraja, Dr. M. Sreedevi, " Detecting attacks and Fraud links in Google Play, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1191-1194, March-April-2018.