This chapter compares three different machine learning techniques, i.e. Gaussian process classification, decision tree classification and support vector classification, based on their ability to learn and detect the attributes of a malicious website. The data used have all been sourced from HTTP headers, WHOIS lookups and DNS records. As a result, this does not require parsing of the website content. The data are first subjected to multiple steps of pre-processing including data formatting, missing value replacement, scaling and principal component analysis
Attacks targeting Web system vulnerabilities have shown an increasing trend in the recent past. A co...
In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive...
With the developing interaction of the Internet and public activity, the Internet is taking a gander...
This chapter compares three different machine learning techniques, i.e. Gaussian process classificat...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Amid the rapid proliferation of thousands of new websites daily, distinguishing safe ones from poten...
Nowadays web surfing is an integral part of the life of the average person and everyone would like t...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
The large branches of Machine Learning represent an immense support for the detection of malicious w...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
Phishing detection is a momentous problem which can be deliberated by many researchers with numerous...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Phishing is a type of identity fraud that involves carrying sensitive information including username...
This research study mainly focused on the dynamic malware detection. Malware progressively changes, ...
Attacks targeting Web system vulnerabilities have shown an increasing trend in the recent past. A co...
In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive...
With the developing interaction of the Internet and public activity, the Internet is taking a gander...
This chapter compares three different machine learning techniques, i.e. Gaussian process classificat...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Amid the rapid proliferation of thousands of new websites daily, distinguishing safe ones from poten...
Nowadays web surfing is an integral part of the life of the average person and everyone would like t...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
The large branches of Machine Learning represent an immense support for the detection of malicious w...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
Phishing detection is a momentous problem which can be deliberated by many researchers with numerous...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Phishing is a type of identity fraud that involves carrying sensitive information including username...
This research study mainly focused on the dynamic malware detection. Malware progressively changes, ...
Attacks targeting Web system vulnerabilities have shown an increasing trend in the recent past. A co...
In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive...
With the developing interaction of the Internet and public activity, the Internet is taking a gander...