Malicious web domains represent a big threat to web users\u27 privacy and security. With so much freely available data on the Internet about web domains\u27 popularity and performance, this study investigated the performance of well-known machine learning techniques used in conjunction with this type of online data to identify malicious web domains. Two datasets consisting of malware and phishing domains were collected to build and evaluate the machine learning classifiers. Five single classifiers and four ensemble classifiers were applied to distinguish malicious domains from benign ones. In addition, a binary particle swarm optimisation (BPSO) based feature selection method was used to improve the performance of single classifiers. Experi...
Nowadays web surfing is an integral part of the life of the average person and everyone would like t...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
This chapter compares three different machine learning techniques, i.e. Gaussian process classificat...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
In this paper, we compare the performance of several machine learning based approaches for the tasks...
Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many...
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker perfo...
The increasing development of the Internet, more and more applications are put into websites can be ...
Malware is one of the most common security threats experienced by a user when browsing web pages. A ...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Cybersecurity attacks are constantly occurring and tend to increase every year. Defensive and preven...
Nowadays web surfing is an integral part of the life of the average person and everyone would like t...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
This chapter compares three different machine learning techniques, i.e. Gaussian process classificat...
Malicious web domains represent a big threat to web users' privacy and security. With so much freely...
In this paper, we compare the performance of several machine learning based approaches for the tasks...
Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many...
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker perfo...
The increasing development of the Internet, more and more applications are put into websites can be ...
Malware is one of the most common security threats experienced by a user when browsing web pages. A ...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Machine learning (ML) provides popular tools for data analysis. It has as of late indicated promisin...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Cybersecurity attacks are constantly occurring and tend to increase every year. Defensive and preven...
Nowadays web surfing is an integral part of the life of the average person and everyone would like t...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
This chapter compares three different machine learning techniques, i.e. Gaussian process classificat...