Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many types of current cyber attacks use URLs for attack communications (e.g., C&C, phishing, and spear-phishing). Despite the continuous progress in detecting cyber attacks, there are still critical weak spots in the structure of defense mechanisms. Since machine learning has become one of the most prominent malware detection methods, a robust feature selection mechanism is proposed that results in malicious domain detection models that are resistant to evasion attacks. This mechanism exhibits a high performance based on empirical data. This paper makes two main contributions: First, it provides an analysis of robust feature selection based on wi...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that brea...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
Abstract—Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass ...
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial se...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
Along with the means of communication, it has also prompted the birth of more harmful, and challengi...
Phishing is a social engineering technique that is commonly used to deceive users in an attempt to o...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Cybersecurity attacks are constantly occurring and tend to increase every year. Defensive and preven...
Abstract. Phishing – a hotbed of multibillion dollar underground economy – has become an important c...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that brea...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
Abstract—Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass ...
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial se...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
Along with the means of communication, it has also prompted the birth of more harmful, and challengi...
Phishing is a social engineering technique that is commonly used to deceive users in an attempt to o...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Cybersecurity attacks are constantly occurring and tend to increase every year. Defensive and preven...
Abstract. Phishing – a hotbed of multibillion dollar underground economy – has become an important c...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Malicious Web sites are a cornerstone of Internet criminal activities. They host a variety of unwant...
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that brea...