SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 06-12
www.iosrjournals.org
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 6 | Page
State of the Art Analysis Approach for Identification of the
Malignant URLs
Amruta Rajeev Nagaonkar , Umesh L. Kulkarni
Shivaji University Department of Computer Science & Engineering Kolhapur, India
Mumbai University Department of Computer Engineering Mumbai, India
Abstract: Malicious URLs have been universally used to ascend various cyber attacks including spamming,
phishing and malware. Malware, short term for malicious software, is software which is developed to penetrate
computers in a network without the user’s permission or notification. Existing methods typically detect
malicious URLs of a single attack type. Hence such detection systems are failed to protect the users from
various attacks. Malware spreading widely throughout the area of network as consequence of this it becomes
predicament in distributed computer and network systems. Malicious links are the place of origin of all attacks
which circulated all over the web. Hence malicious URLs should be detected for the prevention of users from
these malware attacks. In this paper we described a novel approach which analyze all types of attacks by
identifying malicious URLs and secure the web users from them. This technique prevents the users from
malignant URLs before visiting them. Therefore efficiency of web security gets maintained. For such
anatomization we developed an analyzer which identifies URLs and examine as malicious or benign. We also
developed five processes which crawl for suspicious URLs. This approach will prevent the users from all types
of attacks and increase efficiency of web crawling phase.
Keywords: Malicious URLs, Analyzer, Malware
I. Introduction
Malicious web content has become the primary instrument. Malware is a common term for a variety
type of malicious software. In general, Malwares include Worm, Botnet, virus, Trojan horse, Backdoor, Rootkit,
Logic bomb, Rabbit and Spyware used by miscreants to perform their attacks on the Internet.
To address Web-based attacks, a great effort has been directed towards detection of malicious URLs. A
common countermeasure is to use a blacklist of malicious URLs, which can be constructed from various
sources, particularly human feedbacks that are highly accurate yet time-consuming. Blacklisting incurs no false
positives, yet is effective only for known malicious URLs. It cannot detect unknown malicious URLs. This
weakness of blacklisting has been addressed by Anomaly based detection methods designed to detect unknown
malicious URLs. This paper presents an analysis system for malicious websites before the website is displayed
in the browser. In contrast to previous work, this approach is much more general. It can detect many different
forms of malicious attacks. Our system combines generality with usability since it is executed directly in real
time on the client running the web browser.
The main advantage of this approach is that it is instantly usable by end-users. The approach is also
rather flexible since it does not restrict the ways in which malicious websites are analyzed and detected, i.e., it is
able to cover a broad range of malicious behaviour. However, the approach relies on a dedicated infrastructure,
i.e., crawlers to analyse websites and a central database to which web browsers can connect. A number of
approaches have been proposed to detect malicious web pages. Traditional anti-virus tools use static signatures
to match patterns that are commonly found in malicious scripts [1].
Unfortunately, the effectiveness of syntactic signatures is thwarted by the use of sophisticated
obfuscation techniques that often hide the exploit code contained in malicious pages. Very common approach
which is widely used is a blacklisting. The blacklists are particularly human feedbacks that are highly accurate
yet time consuming. Blacklisting [4] is effective only for known malicious URLs. Predictably, many malicious
sites are not blacklisted either because they are too new, were never evaluated, or were evaluated incorrectly.
Another approach is based on low-interaction honeyclients, which simulate a regular browser and rely
on specifications to match the behaviour, rather than the syntactic features, of malicious scripts [2, 3]. A
problem with low-interaction honeyclients is that they are limited by the coverage of their specification
database; that is, attacks for which a specification is not available cannot be detected. Finally, the state of- the-
art in malicious JavaScript detection is represented by high interaction honeyclients.
However, high-interaction client honeypots face some challenges of their own. First, they require
considerable resources, in that a dedicated system – a physical machine or a virtualized environment – is
necessary for them to function, which has a direct negative impact on the performance and scalability of these
systems.
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 7 | Page
Second, high-interaction client honeypots have a tendency to fail at identifying malicious web pages, producing
false negatives that are rooted in the detection mechanism. The client honeypot uses a vulnerable client that
interacts with the web server and then makes an assessment based on the state changes that occur following an
attack. However, if the attack does not meet a vulnerable client, no state changes occur and the malicious page is
therefore not detected. Before using a particular URL if one could inform users that it was dangerous to visit,
much of this problem could be solved. On the basis of this to avoid malware attacks, we designed a framework
based on data mining technique where analyzer classifies the URLs into malicious and benign precisely. Hence
it has ability to find compromised, legitimate URLs or web pages as well as newly formed malicious
executables which are directly set up by attackers.
In this paper, a presented framework detects automatically and accurately, previously and also newly
generated URLs by attackers. Our goal is to design and build software which has an effective analyzer that
accurately detects malicious executables before they execute o n user‟s machine.
This system consists of three step processes to identify malicious URLs. Firstly suspicious URLs are
collected from five functional processes which are examined in depth using analyzer for classifying URLs into
malicious and benign, then last step is submitting these malicious URLs to our database
II. System Architecture
A. Proposed System Architecture:
This approach is going to be used for detecting and analyzing URLs on web efficiently for classifying
into malicious or not. In proposed work, analyzer classifies web pages into malicious and benign. This also
classifies new malicious content added into web pages. To find out other corresponding pages different types of
methods has been added for better classification. These collected pages or URLs will be stored in dataset by
proxy server. This will avoid direct contact with search engine. Proxy server will act as firewall between user
and malicious contents. The following figure indicates proposed system architecture.
Fig1. Proposed System architecture
B. Developing Processes:
In this section, methods are developed to find correlated suspicious links. These five methods perform the
processing steps which gives result as additional malignant contents from search engine through web.
 Following are five methods involved in first methods:
1. Links Process
2. Content Dorks Process
3. Search Engine Optimization Process
4. Domain Registration Process
5. DNS Queries Process
The working of all these methods is different and explained as below:
1. Links Process:
A given link as suspicious URL to this method, it finds the correlated links of it. Later it submitted to analyzer
for classification purpose.
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 8 | Page
2. Content Dork Method:
Content dorks method searches the suspicious URLs by using known malicious keywords. These malicious
keywords are taken from Google Hacking Database. All content dorks are yield to search engine for obtaining
their links and applying analyzer for classification.
3. Search Engine Optimization Method:
The objective of search engine optimization (SEO) method is to identify a cloaking technique as well as links
which show malicious page and its corresponding cloaked page which is set up by attackers.
4. Domain Registration Process:
Domain registration is the process where all the domains must be registered, when they are newly created and
uploaded on Internet. This method discovers registration history of input URL. If any link find it as suspicious
then this method flagged to not only that domain but domains which are before and after of that domain also.
5. DNS Queries Process:
Domain name system is the process which provides global mapping between IP addresses and domain names. it
discovers the path of DNS requests to acquire a suspicious or malicious domain or URL from traced path.
III. Development of Analyzer for Classifying URLS
In this section, analyzer is developed to classify URLs into benign and malicious. For this classification purpose
lexical and host- based features are utilized. Finally machine learning classifier is used for analysis like Naive
Bayes.
A. URL Lexical features:
Malicious URLs look different to users who see them. Hence URL parsed to retrieve hostname and path name
for classification purpose. It consist of two lists i.e. malicious URLs and benign URLs.
Following are the characteristics which have chosen and included in lexical features:
1.URL parsed to retrieve hostname and the path.
2.Delimiters used like (strings delimited by „.‟, „/‟, „?‟, „.‟, „=‟, „-‟ and „_‟).
3. Length of URL
4. Length of hyphen
5. Length of domain
6. Domain name extension
7. Length of max-length in domain name
8. Length of directory
After this, comparison takes place by calculating above properties of malicious as well as benign URLs with
each other. It gives result as input URL is malicious or benign.
 Naïve Bayes Theorem:
It is commonly used in spam filters. It is a probabilistic method based on applying Bayes theorem. It describes
the probability of an event, based on conditions that might be related to the event. Specifically, to compute the
class of a program given that the program contains a set of features F, C to be a random variable over the set of
classes: benign and malicious executables. To compute P , the probability that a program is in a certain class
given the program contains the set of features. Applying Bayes rule and express the probability is
𝑃(𝐶/𝐹) =
P F/C ∗ P(C)
𝑃(𝐹)
B. URL Host- based features:
There are number of host based features but here following are considered:
1. Check for blacklist IP addresses.
2. Date of registration, update and expiration.
3. Check value of the time-to-live (TTL) for the DNS records associated with the hostname.
4. Geographical location of the IP address belongs.
5. Check for who is registrar and registrant.
This approach gives appropriate result for classifying URLs as either malicious or benign based on both lexical
and host-based features.
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 9 | Page
By applying both lexical and host based features on URLs, they appropriately analyzed into malicious and
benign URLs.
After this implementation of analyzer we have collected final malicious URLs dataset which we have submitted
to our implemented proxy server. This proxy server acts as firewall between user and malicious URLs. Proxy
servers have mainly two purposes:
1. Improve performance:
Proxy servers can dramatically improve performance for groups of users. This is because it saves the results
of all requests for a certain amount of time.
2. Filter Requests:
Proxy servers can also be used to filter requests. For example, a company might use a proxy server to
prevent its employees from accessing a specific set of Web sites.
 Working of Proxy Server:
 The proxy server evaluates the request means the proxy provides the resource by connecting to the relevant
server and requesting the service on behalf of the client.
 Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site.
 If the URL matches a pattern or a site that requires a proxy, it will connect to the proxy server rather than
going directly to the site.
 Check it in to the dataset as well as submit to the analyzer to classify the URLs as malicious and benign.
 After above step identified malicious URLs submit to all methods to generate all corresponding URLs for
gathering more malicious executables.
 Security Advantages:
 Blocking of dangerous URLs
 Filter dangerous content
 Eliminate need for transport layer routing between networks
 Single point of access, control and logging
IV. Experimental Evaluation
In this section, we experimentally validate our initial hypothesis used in our project is effective by
identifying as well as blocking malignant URLs and it does so in an effective manner.
We have used two key metrics to establish the effectiveness of our system is toxicity and accuracy.
Toxicity is calculated by number of suspicious URLs submitted by all methods to analyzer.
Accuracy is measured by accuracy (ACC) which is the proportion of true results (both true positives and true
negatives) over all data sets; true positive rate (TP, also referred to as recall) which is the number of the true
positive classifications divided by the number of positive examples; false positive rate (FP) and false negative
rate (FN) which are defined similarly.
A. Links Process:
Total 2684 suspicious URLs are collected by this method, from which 233 URLS are identified as pure
malignant by our analyzer. Hence toxicity of this process is 0.0868.
B. Content dorks Process:
This method contains all malign keywords which were taken from Google Hacking Database. Hence all
corresponding URLs from this method are malicious. This process have found total 1012 URLs and
submitted to our analyzer, from which 669 URLs are found as malignant. 0.66.
C. S.E.O Process:
This process found 35 web sites which are cloacked and after submitted to these URLs to analyzer, it classified
as 15 URLs are cloacked web links.
D. Domain Registration Process:
At the first time this process did not find any URL, but after some days we examined that this process found 18
URLs as suspicious from which 7 URLs are classified as malicious.
E. DNS Queries Process:
This process found 16 URLs from which 5 URLs are malign URLs.
Hence we examined that these count of malicious URLs is changed as these processes found URLs and their
count also changed as input given to them.
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 10 | Page
Overall, this experiment shows that this system clearly outperforms in toxicity 1.34%.
 Detection Accuracy:
1. True Positives (TP), the number of malicious executable examples classified as malicious executables.
2. True Negatives (TN), the number of benign programs classified as benign.
3. False Positives (FP), the number of benign programs classified as malicious executables.
4. False Negatives (FN), the number of malicious executables classified as benign binaries.
By applying the discriminative features on the datasets our malicious URL detector produced the following
results:
 Lexical feature Analysis:
Lexical features are the textual properties of the URL itself. These properties include the length of the
hostname, the length of the entire URL, as well as the number of dots in the URL, maximum length of domain,
count of hyphens in domain name, length of directories.
After measurement of these properties, input URL is trained and classified into benign or malignant by applying
Naive Bayes classifier.
Naive Bayes is a classifier that sees wide-spread use in spam filters and related security applications, in part
because the training and testing performance of Naive Bayes is fast.
However, the benefit of reduced training time is outweighed in this case by the benefit of using classifiers whose
explicit goal is to minimize errors. This trade off is particularly worthwhile when dealing with a large feature
set.
Following explanations show both true positive and negative as well as false positives and negative rates:
 True positive and Negative:
Total 100 malicious and benign URLs have submitted to the lexical analyzer from which it successfully
classified these URLs into benign and malicious URLs with true positive and negative rates.
 False positives:
A false positive is when a benign URL is misclassified as malicious.
Apart from these datasets, we have found other types of URLs on Internet which were misclassified as
malicious by other detectors but in actual they are benign. There are different types of URLs are categorized to
trap the users, like disreputable, contentless, abnormal token, brand name URLs. Such types of URLs we
submitted to our Lexical analyzer to check false positive rate.
For this we have chosen URLs from each category and submitted to Lexical analyzer hence we got following
result:
 Disreputable URLs:
A benign URL is likely misclassified by our detector if it fits into two or more of the following three cases: 1)
the URL‟s domain has a very low link popularity (LPOP errors), 2) the URL contains a malicious SLD (LEX
errors), and 3) the URL‟s domain is hosted by malicious ASNs (DNS errors). In this case, a benign URL can be
considered as a disreputable URL. (ex: : 208.43.27.50/˜mike).
But our analyzer shows correct result as expected.
 Contentless URLs:
Some benign URLs had no content on their web pages. In this case (e.g., 222.191.251.167, 1traf.com, and
3gmatrix.cn). But our analyzer shows correct result as expected for this contentless URLs.
 Brand name URL:
Some benign URLs contained a brand name keyword even they were not related to the brand domain. These
URLs could be misclassified as malicious (e.g., twitterfollower.wikispaces.com).
But for this type of URL analyzer misclassified.
 Abnormal token URL:
We observed several benign URLs which had unusual long domain tokens typically appearing in phishing URLs
(e.g.,8centraldevideoscomhomensmaduros.blogspot.com).
But for abnormal token URL analyzer misclassified.
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 11 | Page
 False Negative:
A false negative is when a malicious URL is undetected.
Most of the false negative URLs are of spam or phishing type URLs. They generated features similar to those of
benign URLs.
Hence we have taken some examples and submitted to our analyzer. Analyzer gave accurate results. More than
95% detectors failed to identify such URLs like blog.libero.it/matteof97/ and digilander.libero.it/Malvin92/?For
analysis we have given these URLs to our lexical analyzer and we got correct results.
 Lexical Analyzer Accuracy:
Accuracy No of URLs
TP 48
TN 97
FP 2
FN 3
Table 2.shows accuracy of lexical Analyzer
 Lexical Analyzer Graph:
Graph1. Lexical Analyzer
 Host based analyzer Accuracy:
This analyzer searched all the host features of URLs. We have collected 3190 blacklisted URLs, from which
1205 URLs are submitted to the analyzer to check. According to this analyzer it scrutinized 850 URLs as
malignant and 6 URLs are misclassified as malicious and five URLs are misclassified as benign. Remained 150
URLs are found as their access was denied.
Accuracy No of URLs
TP 44
TN 850
FP 6
FN 5
Table 3.shows accuracy of host-based Analyzer
0
50
100
150
TP TN FP FN
No. of URLs
No. of URLs
State of the Art Analysis Approach for Identification of the Malignant URLs
DOI: 10.9790/0661-1901020612 www.iosrjournals.org 12 | Page
Host based analyzer Graph:
Graph2. Host- based Analyzer
Conclusion
Using one malicious URL, the web is crawled so as to obtain a big dataset of suspicious URLs. The suspicious
URLs are retrieved using googlebot, keywords, S.E.O techniques and domain name services.
These suspicious URLs are analyzed and are declared whether they are benign or malicious, and the results are
found to be mostly correct on observation.
References
[1]. ClamAV. Clam AntiVirus. http://www.clamav.net
[2]. J. Nazario. PhoneyC: A Virtual Client Honeypot.In Proceedings of the USENIX Workshop on Large
Scale Exploits and Emergent Threats, 2009.
[3]. A. Ikinci, T. Holz, and F. Freiling. Monkey Spider: Detecting Malicious Websites with Low-Interaction
Honeyclients. In Proceedings of Sicherheit, Schutz und Zuverlässigkeit, April 2008.
[4]. C. Whittaker, B. Ryner, and M. Nazif, “Large-Scale Automatic Classification of Phishing Pages”, In
Proceedings of the 17th
Annual Network and Distributed System Security Symposium (NDSS‟10),San
Diego, CA, Mar 2010.
[5]. Luca Invernizzi, Santa Barbara,Stefano Benvenuti,Paolo Milani,Comparetti Lastline,Vienna,
“EVILSEED: A Guided Approach to Finding Malicious Web Pages,” in IEEE Symposium on Security
and Privacy 20-23 May 2012, pp 428 – 442.
0
100
200
300
400
500
600
700
800
900
TP TN FP FN unclassified
No. of URLs
No. of URLs

Mais conteúdo relacionado

Mais procurados

Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsShîvä Mängęnä
 
CSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using MiddlewareCSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using Middlewareijtsrd
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customerEMC
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting toolBhagyashri Chalakh
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Miguel de la Cruz
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...JPINFOTECH JAYAPRAKASH
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityColin English
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awarenessJanagi Kannan
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentationAlbena Asenova-Belal
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 

Mais procurados (20)

Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
CSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using MiddlewareCSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using Middleware
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Facebook
FacebookFacebook
Facebook
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
 
50120140504017
5012014050401750120140504017
50120140504017
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 

Semelhante a State of the Art Analysis Approach for Identification of the Malignant URLs

MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...UltraUploader
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing WebsitesIRJET Journal
 
detection of malicious URLs.pptx
detection of malicious URLs.pptxdetection of malicious URLs.pptx
detection of malicious URLs.pptxmanash40
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...csandit
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...cscpconf
 
Classification Model to Detect Malicious URL via Behaviour Analysis
Classification Model to Detect Malicious URL via Behaviour AnalysisClassification Model to Detect Malicious URL via Behaviour Analysis
Classification Model to Detect Malicious URL via Behaviour AnalysisEditor IJCATR
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...IJCNCJournal
 
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYA SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYIJNSA Journal
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxrakhicse
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET Journal
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...IJCNCJournal
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...IJCNCJournal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 

Semelhante a State of the Art Analysis Approach for Identification of the Malignant URLs (20)

MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing Websites
 
detection of malicious URLs.pptx
detection of malicious URLs.pptxdetection of malicious URLs.pptx
detection of malicious URLs.pptx
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
 
Classification Model to Detect Malicious URL via Behaviour Analysis
Classification Model to Detect Malicious URL via Behaviour AnalysisClassification Model to Detect Malicious URL via Behaviour Analysis
Classification Model to Detect Malicious URL via Behaviour Analysis
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
 
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYA SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
PUMMP: PHISHING URL DETECTION USING MACHINE LEARNING WITH MONOMORPHIC AND POL...
 
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Pol...
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 

Mais de IOSRjournaljce

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover MapsIOSRjournaljce
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXIOSRjournaljce
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.IOSRjournaljce
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud ComputingIOSRjournaljce
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...IOSRjournaljce
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsIOSRjournaljce
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...IOSRjournaljce
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...IOSRjournaljce
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsIOSRjournaljce
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...IOSRjournaljce
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingIOSRjournaljce
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
 

Mais de IOSRjournaljce (20)

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud Computing
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital Footprints
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and Evaluating
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
 

Último

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Último (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

State of the Art Analysis Approach for Identification of the Malignant URLs

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 06-12 www.iosrjournals.org DOI: 10.9790/0661-1901020612 www.iosrjournals.org 6 | Page State of the Art Analysis Approach for Identification of the Malignant URLs Amruta Rajeev Nagaonkar , Umesh L. Kulkarni Shivaji University Department of Computer Science & Engineering Kolhapur, India Mumbai University Department of Computer Engineering Mumbai, India Abstract: Malicious URLs have been universally used to ascend various cyber attacks including spamming, phishing and malware. Malware, short term for malicious software, is software which is developed to penetrate computers in a network without the user’s permission or notification. Existing methods typically detect malicious URLs of a single attack type. Hence such detection systems are failed to protect the users from various attacks. Malware spreading widely throughout the area of network as consequence of this it becomes predicament in distributed computer and network systems. Malicious links are the place of origin of all attacks which circulated all over the web. Hence malicious URLs should be detected for the prevention of users from these malware attacks. In this paper we described a novel approach which analyze all types of attacks by identifying malicious URLs and secure the web users from them. This technique prevents the users from malignant URLs before visiting them. Therefore efficiency of web security gets maintained. For such anatomization we developed an analyzer which identifies URLs and examine as malicious or benign. We also developed five processes which crawl for suspicious URLs. This approach will prevent the users from all types of attacks and increase efficiency of web crawling phase. Keywords: Malicious URLs, Analyzer, Malware I. Introduction Malicious web content has become the primary instrument. Malware is a common term for a variety type of malicious software. In general, Malwares include Worm, Botnet, virus, Trojan horse, Backdoor, Rootkit, Logic bomb, Rabbit and Spyware used by miscreants to perform their attacks on the Internet. To address Web-based attacks, a great effort has been directed towards detection of malicious URLs. A common countermeasure is to use a blacklist of malicious URLs, which can be constructed from various sources, particularly human feedbacks that are highly accurate yet time-consuming. Blacklisting incurs no false positives, yet is effective only for known malicious URLs. It cannot detect unknown malicious URLs. This weakness of blacklisting has been addressed by Anomaly based detection methods designed to detect unknown malicious URLs. This paper presents an analysis system for malicious websites before the website is displayed in the browser. In contrast to previous work, this approach is much more general. It can detect many different forms of malicious attacks. Our system combines generality with usability since it is executed directly in real time on the client running the web browser. The main advantage of this approach is that it is instantly usable by end-users. The approach is also rather flexible since it does not restrict the ways in which malicious websites are analyzed and detected, i.e., it is able to cover a broad range of malicious behaviour. However, the approach relies on a dedicated infrastructure, i.e., crawlers to analyse websites and a central database to which web browsers can connect. A number of approaches have been proposed to detect malicious web pages. Traditional anti-virus tools use static signatures to match patterns that are commonly found in malicious scripts [1]. Unfortunately, the effectiveness of syntactic signatures is thwarted by the use of sophisticated obfuscation techniques that often hide the exploit code contained in malicious pages. Very common approach which is widely used is a blacklisting. The blacklists are particularly human feedbacks that are highly accurate yet time consuming. Blacklisting [4] is effective only for known malicious URLs. Predictably, many malicious sites are not blacklisted either because they are too new, were never evaluated, or were evaluated incorrectly. Another approach is based on low-interaction honeyclients, which simulate a regular browser and rely on specifications to match the behaviour, rather than the syntactic features, of malicious scripts [2, 3]. A problem with low-interaction honeyclients is that they are limited by the coverage of their specification database; that is, attacks for which a specification is not available cannot be detected. Finally, the state of- the- art in malicious JavaScript detection is represented by high interaction honeyclients. However, high-interaction client honeypots face some challenges of their own. First, they require considerable resources, in that a dedicated system – a physical machine or a virtualized environment – is necessary for them to function, which has a direct negative impact on the performance and scalability of these systems.
  • 2. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 7 | Page Second, high-interaction client honeypots have a tendency to fail at identifying malicious web pages, producing false negatives that are rooted in the detection mechanism. The client honeypot uses a vulnerable client that interacts with the web server and then makes an assessment based on the state changes that occur following an attack. However, if the attack does not meet a vulnerable client, no state changes occur and the malicious page is therefore not detected. Before using a particular URL if one could inform users that it was dangerous to visit, much of this problem could be solved. On the basis of this to avoid malware attacks, we designed a framework based on data mining technique where analyzer classifies the URLs into malicious and benign precisely. Hence it has ability to find compromised, legitimate URLs or web pages as well as newly formed malicious executables which are directly set up by attackers. In this paper, a presented framework detects automatically and accurately, previously and also newly generated URLs by attackers. Our goal is to design and build software which has an effective analyzer that accurately detects malicious executables before they execute o n user‟s machine. This system consists of three step processes to identify malicious URLs. Firstly suspicious URLs are collected from five functional processes which are examined in depth using analyzer for classifying URLs into malicious and benign, then last step is submitting these malicious URLs to our database II. System Architecture A. Proposed System Architecture: This approach is going to be used for detecting and analyzing URLs on web efficiently for classifying into malicious or not. In proposed work, analyzer classifies web pages into malicious and benign. This also classifies new malicious content added into web pages. To find out other corresponding pages different types of methods has been added for better classification. These collected pages or URLs will be stored in dataset by proxy server. This will avoid direct contact with search engine. Proxy server will act as firewall between user and malicious contents. The following figure indicates proposed system architecture. Fig1. Proposed System architecture B. Developing Processes: In this section, methods are developed to find correlated suspicious links. These five methods perform the processing steps which gives result as additional malignant contents from search engine through web.  Following are five methods involved in first methods: 1. Links Process 2. Content Dorks Process 3. Search Engine Optimization Process 4. Domain Registration Process 5. DNS Queries Process The working of all these methods is different and explained as below: 1. Links Process: A given link as suspicious URL to this method, it finds the correlated links of it. Later it submitted to analyzer for classification purpose.
  • 3. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 8 | Page 2. Content Dork Method: Content dorks method searches the suspicious URLs by using known malicious keywords. These malicious keywords are taken from Google Hacking Database. All content dorks are yield to search engine for obtaining their links and applying analyzer for classification. 3. Search Engine Optimization Method: The objective of search engine optimization (SEO) method is to identify a cloaking technique as well as links which show malicious page and its corresponding cloaked page which is set up by attackers. 4. Domain Registration Process: Domain registration is the process where all the domains must be registered, when they are newly created and uploaded on Internet. This method discovers registration history of input URL. If any link find it as suspicious then this method flagged to not only that domain but domains which are before and after of that domain also. 5. DNS Queries Process: Domain name system is the process which provides global mapping between IP addresses and domain names. it discovers the path of DNS requests to acquire a suspicious or malicious domain or URL from traced path. III. Development of Analyzer for Classifying URLS In this section, analyzer is developed to classify URLs into benign and malicious. For this classification purpose lexical and host- based features are utilized. Finally machine learning classifier is used for analysis like Naive Bayes. A. URL Lexical features: Malicious URLs look different to users who see them. Hence URL parsed to retrieve hostname and path name for classification purpose. It consist of two lists i.e. malicious URLs and benign URLs. Following are the characteristics which have chosen and included in lexical features: 1.URL parsed to retrieve hostname and the path. 2.Delimiters used like (strings delimited by „.‟, „/‟, „?‟, „.‟, „=‟, „-‟ and „_‟). 3. Length of URL 4. Length of hyphen 5. Length of domain 6. Domain name extension 7. Length of max-length in domain name 8. Length of directory After this, comparison takes place by calculating above properties of malicious as well as benign URLs with each other. It gives result as input URL is malicious or benign.  Naïve Bayes Theorem: It is commonly used in spam filters. It is a probabilistic method based on applying Bayes theorem. It describes the probability of an event, based on conditions that might be related to the event. Specifically, to compute the class of a program given that the program contains a set of features F, C to be a random variable over the set of classes: benign and malicious executables. To compute P , the probability that a program is in a certain class given the program contains the set of features. Applying Bayes rule and express the probability is 𝑃(𝐶/𝐹) = P F/C ∗ P(C) 𝑃(𝐹) B. URL Host- based features: There are number of host based features but here following are considered: 1. Check for blacklist IP addresses. 2. Date of registration, update and expiration. 3. Check value of the time-to-live (TTL) for the DNS records associated with the hostname. 4. Geographical location of the IP address belongs. 5. Check for who is registrar and registrant. This approach gives appropriate result for classifying URLs as either malicious or benign based on both lexical and host-based features.
  • 4. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 9 | Page By applying both lexical and host based features on URLs, they appropriately analyzed into malicious and benign URLs. After this implementation of analyzer we have collected final malicious URLs dataset which we have submitted to our implemented proxy server. This proxy server acts as firewall between user and malicious URLs. Proxy servers have mainly two purposes: 1. Improve performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. 2. Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.  Working of Proxy Server:  The proxy server evaluates the request means the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client.  Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site.  If the URL matches a pattern or a site that requires a proxy, it will connect to the proxy server rather than going directly to the site.  Check it in to the dataset as well as submit to the analyzer to classify the URLs as malicious and benign.  After above step identified malicious URLs submit to all methods to generate all corresponding URLs for gathering more malicious executables.  Security Advantages:  Blocking of dangerous URLs  Filter dangerous content  Eliminate need for transport layer routing between networks  Single point of access, control and logging IV. Experimental Evaluation In this section, we experimentally validate our initial hypothesis used in our project is effective by identifying as well as blocking malignant URLs and it does so in an effective manner. We have used two key metrics to establish the effectiveness of our system is toxicity and accuracy. Toxicity is calculated by number of suspicious URLs submitted by all methods to analyzer. Accuracy is measured by accuracy (ACC) which is the proportion of true results (both true positives and true negatives) over all data sets; true positive rate (TP, also referred to as recall) which is the number of the true positive classifications divided by the number of positive examples; false positive rate (FP) and false negative rate (FN) which are defined similarly. A. Links Process: Total 2684 suspicious URLs are collected by this method, from which 233 URLS are identified as pure malignant by our analyzer. Hence toxicity of this process is 0.0868. B. Content dorks Process: This method contains all malign keywords which were taken from Google Hacking Database. Hence all corresponding URLs from this method are malicious. This process have found total 1012 URLs and submitted to our analyzer, from which 669 URLs are found as malignant. 0.66. C. S.E.O Process: This process found 35 web sites which are cloacked and after submitted to these URLs to analyzer, it classified as 15 URLs are cloacked web links. D. Domain Registration Process: At the first time this process did not find any URL, but after some days we examined that this process found 18 URLs as suspicious from which 7 URLs are classified as malicious. E. DNS Queries Process: This process found 16 URLs from which 5 URLs are malign URLs. Hence we examined that these count of malicious URLs is changed as these processes found URLs and their count also changed as input given to them.
  • 5. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 10 | Page Overall, this experiment shows that this system clearly outperforms in toxicity 1.34%.  Detection Accuracy: 1. True Positives (TP), the number of malicious executable examples classified as malicious executables. 2. True Negatives (TN), the number of benign programs classified as benign. 3. False Positives (FP), the number of benign programs classified as malicious executables. 4. False Negatives (FN), the number of malicious executables classified as benign binaries. By applying the discriminative features on the datasets our malicious URL detector produced the following results:  Lexical feature Analysis: Lexical features are the textual properties of the URL itself. These properties include the length of the hostname, the length of the entire URL, as well as the number of dots in the URL, maximum length of domain, count of hyphens in domain name, length of directories. After measurement of these properties, input URL is trained and classified into benign or malignant by applying Naive Bayes classifier. Naive Bayes is a classifier that sees wide-spread use in spam filters and related security applications, in part because the training and testing performance of Naive Bayes is fast. However, the benefit of reduced training time is outweighed in this case by the benefit of using classifiers whose explicit goal is to minimize errors. This trade off is particularly worthwhile when dealing with a large feature set. Following explanations show both true positive and negative as well as false positives and negative rates:  True positive and Negative: Total 100 malicious and benign URLs have submitted to the lexical analyzer from which it successfully classified these URLs into benign and malicious URLs with true positive and negative rates.  False positives: A false positive is when a benign URL is misclassified as malicious. Apart from these datasets, we have found other types of URLs on Internet which were misclassified as malicious by other detectors but in actual they are benign. There are different types of URLs are categorized to trap the users, like disreputable, contentless, abnormal token, brand name URLs. Such types of URLs we submitted to our Lexical analyzer to check false positive rate. For this we have chosen URLs from each category and submitted to Lexical analyzer hence we got following result:  Disreputable URLs: A benign URL is likely misclassified by our detector if it fits into two or more of the following three cases: 1) the URL‟s domain has a very low link popularity (LPOP errors), 2) the URL contains a malicious SLD (LEX errors), and 3) the URL‟s domain is hosted by malicious ASNs (DNS errors). In this case, a benign URL can be considered as a disreputable URL. (ex: : 208.43.27.50/˜mike). But our analyzer shows correct result as expected.  Contentless URLs: Some benign URLs had no content on their web pages. In this case (e.g., 222.191.251.167, 1traf.com, and 3gmatrix.cn). But our analyzer shows correct result as expected for this contentless URLs.  Brand name URL: Some benign URLs contained a brand name keyword even they were not related to the brand domain. These URLs could be misclassified as malicious (e.g., twitterfollower.wikispaces.com). But for this type of URL analyzer misclassified.  Abnormal token URL: We observed several benign URLs which had unusual long domain tokens typically appearing in phishing URLs (e.g.,8centraldevideoscomhomensmaduros.blogspot.com). But for abnormal token URL analyzer misclassified.
  • 6. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 11 | Page  False Negative: A false negative is when a malicious URL is undetected. Most of the false negative URLs are of spam or phishing type URLs. They generated features similar to those of benign URLs. Hence we have taken some examples and submitted to our analyzer. Analyzer gave accurate results. More than 95% detectors failed to identify such URLs like blog.libero.it/matteof97/ and digilander.libero.it/Malvin92/?For analysis we have given these URLs to our lexical analyzer and we got correct results.  Lexical Analyzer Accuracy: Accuracy No of URLs TP 48 TN 97 FP 2 FN 3 Table 2.shows accuracy of lexical Analyzer  Lexical Analyzer Graph: Graph1. Lexical Analyzer  Host based analyzer Accuracy: This analyzer searched all the host features of URLs. We have collected 3190 blacklisted URLs, from which 1205 URLs are submitted to the analyzer to check. According to this analyzer it scrutinized 850 URLs as malignant and 6 URLs are misclassified as malicious and five URLs are misclassified as benign. Remained 150 URLs are found as their access was denied. Accuracy No of URLs TP 44 TN 850 FP 6 FN 5 Table 3.shows accuracy of host-based Analyzer 0 50 100 150 TP TN FP FN No. of URLs No. of URLs
  • 7. State of the Art Analysis Approach for Identification of the Malignant URLs DOI: 10.9790/0661-1901020612 www.iosrjournals.org 12 | Page Host based analyzer Graph: Graph2. Host- based Analyzer Conclusion Using one malicious URL, the web is crawled so as to obtain a big dataset of suspicious URLs. The suspicious URLs are retrieved using googlebot, keywords, S.E.O techniques and domain name services. These suspicious URLs are analyzed and are declared whether they are benign or malicious, and the results are found to be mostly correct on observation. References [1]. ClamAV. Clam AntiVirus. http://www.clamav.net [2]. J. Nazario. PhoneyC: A Virtual Client Honeypot.In Proceedings of the USENIX Workshop on Large Scale Exploits and Emergent Threats, 2009. [3]. A. Ikinci, T. Holz, and F. Freiling. Monkey Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. In Proceedings of Sicherheit, Schutz und Zuverlässigkeit, April 2008. [4]. C. Whittaker, B. Ryner, and M. Nazif, “Large-Scale Automatic Classification of Phishing Pages”, In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS‟10),San Diego, CA, Mar 2010. [5]. Luca Invernizzi, Santa Barbara,Stefano Benvenuti,Paolo Milani,Comparetti Lastline,Vienna, “EVILSEED: A Guided Approach to Finding Malicious Web Pages,” in IEEE Symposium on Security and Privacy 20-23 May 2012, pp 428 – 442. 0 100 200 300 400 500 600 700 800 900 TP TN FP FN unclassified No. of URLs No. of URLs