Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery

M Mansoori, Y Hirose, I Welch… - 2016 IEEE 30th …, 2016 - ieeexplore.ieee.org
Referer is a HTTP header field transmitted to a webserver, which allows the webserver to
identify the origin of the request and the path taken by the visiting user to reach the final …

A novel scoring model to detect potential malicious web pages

I Welch, X Gao, P Komisarczuk - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
Malicious web pages have embedded within them active contents that exploit vulnerabilities
in users' browsers and plug-ins in order to compromise the users' machines. Approaches …

DeMalfier: Detection of malicious Web pages using an effective classifier

AS Manek, V Sumithra, PD Shenoy… - … Conference on Data …, 2014 - ieeexplore.ieee.org
The web has become an indispensable global platform that glues together daily
communication, sharing, trading, collaboration and service delivery. Web users often store …

Activity stream based interaction

JM Van Rotterdam, G Frankel - US Patent 12,131,294, 2024 - Google Patents
An activity stream based interaction model and systems implementing such a model are
disclosed. In various embodiments, a text-based tag is recognized in a received …

Zararlı web sayfalarının tespiti ve sınıflandırılması için yeni bir sistem önerisi

C Kadi - 2018 - acikbilim.yok.gov.tr
Gün geçtikçe değişen ve büyüyen web teknolojileri, kullanıcıların bunlara olan ilgisinin
artmasını fırsat bilen saldırganlar tarafından hedef haline gelmiştir. Kullanıcılar web sayfaları …

Technical identifiers of fraudulent web pages, a systematic literature review

I Orive Múgica - 2020 - diva-portal.org
Fraudulent pages are a danger to which all web users are exposed. These pages have
illegitimate purposes such as the theft of sensitive user information. There are a lot of tools …

Security privilege escalation exploit detection and mitigation

A Sandoval, E Klonowski - US Patent 12,149,623, 2024 - Google Patents
Examples of the present disclosure describe systems and methods for monitoring the
security privileges of a process. In aspects, when a process is created, the corresponding …

Proactive browser content analysis

J Jaroch, HM McCloy III, RE Adams - US Patent 11,593,484, 2023 - Google Patents
(57) ABSTRACT A protection module operates to analyze threats, at the protocol level (eg, at
the HTML level), by intercepting all requests that a browser engine resident in a computing …

A Comprehensive Evaluation of Feature-Based Malicious Website Detection

JF McGahagan IV - 2020 - search.proquest.com
Although the internet enables many important functions of modern life, it is also a ground for
nefarious activity by malicious actors and cybercriminals. For example, malicious websites …

[PDF][PDF] FEATURE-BASED APPROACHES TO DETECT DRIVE-BY DOWNLOAD ATTACKS

LE VAN LAM - ecs.wgtn.ac.nz
Malicious web pages contain malicious code that can exploit a visitor's computer system.
When a visitor visits a malicious web page, it exploits vulnerabilities on the visitor's computer …