Characterizing Current Features of Malicious Threats on Websites
The advance growth of cybercrime in recent years especially in high critical networks becomes an urgent issue to the security authorities. They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpet...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
Springer
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/30781/ https://doi.org/10.1007/978-3-030-00979-3_21 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
id |
my.ump.umpir.30781 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.307812021-02-24T02:13:09Z http://umpir.ump.edu.my/id/eprint/30781/ Characterizing Current Features of Malicious Threats on Websites Wan Nurulsafawati, Wan Manan Ahmed, Abdulghani Ali M. N. M., Kahar QA75 Electronic computers. Computer science The advance growth of cybercrime in recent years especially in high critical networks becomes an urgent issue to the security authorities. They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpetrators. Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. Early detection and act on such threats in a timely manners is vital in order to reduce the losses which have caused billions of dollars every year. Previously, the detection of malicious is done through the use of blacklisting repository. The repository or database was compiled over time through crowd sourcing solution (e.g.: PishTank, Zeus Tracker Blacklist, StopBadWare.. etc.). However, such technique cannot be exhaustive and unable to detect newly generated malicious URL or zero-day exploit. Therefore, this paper aims to provide a comprehensive survey and detailed understanding of malicious code and URL features which have been extracted from the web content and structures of the websites. We studied the characteristic of malicious webpage systematically and syntactically and present the most important features of malicious threats in web pages. Each category will be presented along with different dimensions (features representation, algorithm design, etc.). Springer 2019 Conference or Workshop Item PeerReviewed Wan Nurulsafawati, Wan Manan and Ahmed, Abdulghani Ali and M. N. M., Kahar (2019) Characterizing Current Features of Malicious Threats on Websites. In: Intelligent Computing & Optimization. International Conference on Intelligent Computing & Optimization: ICO 2018, 4-5 October 2018 , Pattaya, Thailand. pp. 210-218., 866. ISBN 978-3-030-00979-3 https://doi.org/10.1007/978-3-030-00979-3_21 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Wan Nurulsafawati, Wan Manan Ahmed, Abdulghani Ali M. N. M., Kahar Characterizing Current Features of Malicious Threats on Websites |
description |
The advance growth of cybercrime in recent years especially in high critical networks becomes an urgent issue to the security authorities. They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpetrators. Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. Early detection and act on such threats in a timely manners is vital in order to reduce the losses which have caused billions of dollars every year. Previously, the detection of malicious is done through the use of blacklisting repository. The repository or database was compiled over time through crowd sourcing solution (e.g.: PishTank, Zeus Tracker Blacklist, StopBadWare.. etc.). However, such technique cannot be exhaustive and unable to detect newly generated malicious URL or zero-day exploit. Therefore, this paper aims to provide a comprehensive survey and detailed understanding of malicious code and URL features which have been extracted from the web content and structures of the websites. We studied the characteristic of malicious webpage systematically and syntactically and present the most important features of malicious threats in web pages. Each category will be presented along with different dimensions (features representation, algorithm design, etc.). |
format |
Conference or Workshop Item |
author |
Wan Nurulsafawati, Wan Manan Ahmed, Abdulghani Ali M. N. M., Kahar |
author_facet |
Wan Nurulsafawati, Wan Manan Ahmed, Abdulghani Ali M. N. M., Kahar |
author_sort |
Wan Nurulsafawati, Wan Manan |
title |
Characterizing Current Features of Malicious Threats on Websites |
title_short |
Characterizing Current Features of Malicious Threats on Websites |
title_full |
Characterizing Current Features of Malicious Threats on Websites |
title_fullStr |
Characterizing Current Features of Malicious Threats on Websites |
title_full_unstemmed |
Characterizing Current Features of Malicious Threats on Websites |
title_sort |
characterizing current features of malicious threats on websites |
publisher |
Springer |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/30781/ https://doi.org/10.1007/978-3-030-00979-3_21 |
_version_ |
1692991977501491200 |