Enhanced malicious traffic detection in encrypted communication using TLS features and a multi-class classifier ensemble
The use of encryption for network communication leads to a significant challenge in
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
A State-of-the-art Review on Phishing Website Detection Techniques
W Li, S Manickam, YW Chong, W Leng… - IEEE Access, 2024 - ieeexplore.ieee.org
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as
a primary tool for attackers to deceive users and steal sensitive information. The rapid …
a primary tool for attackers to deceive users and steal sensitive information. The rapid …
Phishing webpage detection based on global and local visual similarity
In recent years, phishing websites have constantly evolved, causing traditional URL or
HTML-based detection methods less effective. This limitation motivated the development of …
HTML-based detection methods less effective. This limitation motivated the development of …
Detect malicious websites by building a neural network to capture global and local features of websites
L Zhang, Q Yan - Computers & Security, 2024 - Elsevier
With the development of the digital age, the Internet has become an integral part of our daily
lives. However, it has also brought about a series of security challenges, among which …
lives. However, it has also brought about a series of security challenges, among which …
A Review of Data-Driven Approaches for Malicious Website Detection
Z Hu, Z Yuan - 2023 7th Asian Conference on Artificial …, 2023 - ieeexplore.ieee.org
The detection of malicious websites has become a critical issue in cybersecurity. Therefore,
this paper offers a comprehensive review of data-driven methods for detecting malicious …
this paper offers a comprehensive review of data-driven methods for detecting malicious …
[PDF][PDF] A Machine Learning Algorithms for Detecting Phishing Websites: A Comparative Study
MA Taha, HDA Jabar - Iraqi Journal For Computer Science and …, 2024 - iasj.net
Phishing website attacks are a type of cyber-attack in which perpetrators create fraudulent
websites that mimic legitimate platforms, such as online banking or social media, with the …
websites that mimic legitimate platforms, such as online banking or social media, with the …
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal
sensitive user information. Deep learning techniques, particularly convolutional neural …
sensitive user information. Deep learning techniques, particularly convolutional neural …
Transfer Learning for Phishing Detection: Screenshot-Based Website Classification
Phishing remains a significant threat in the evolving cybersecurity landscape as phishing
websites become increasingly similar to legitimate websites, complicating detection using …
websites become increasingly similar to legitimate websites, complicating detection using …
A Consensus Protocol for Incentivizing Contribution from Decentralized Community for Machine Learning-based Scamming Website Detection
The increasing proliferation of phishing and scamming websites has become a significant
threat to the safety and security of internet users. Accurately detecting such websites is …
threat to the safety and security of internet users. Accurately detecting such websites is …
[PDF][PDF] D2. 1–Academic and Technology SoTA Report
M Duran, AŞ duSoft Yazılım, H Kilinc - Sierra (Panel), 2024 - itea4.org
Proactive protection against phishing-based ransomware requires a multi-layered approach
that combines technology, training and best practices. Using these approaches …
that combines technology, training and best practices. Using these approaches …