eHealth Library Ireland Search Results
Author
Scandinavian Contract Research OrganizationCTC Clinical Trial Consultants AB
Format
Report
Author
Jinyang ZhouKun ZhangAnas BilalYu ZhouYukang FanWenting PanXin XieQi Peng
Format
Academic Journal
Description
Abstract With the rapid development of the internet, phishing attacks have become more diverse, making phishing website detection a key focus in cybersecurity. While machine learning and deep learning have led to various phishing URL detection methods, many remain incomplete, limiting accuracy. This paper proposes CSPPC-BiLSTM, a malicious URL detection model based on BiLSTM (Bidirectional Long Short-Term Memory, BiLSTM). The model processes URL character...
Author
Dang Thi Mai
Format
Academic Journal
Description
In the era of digital transformation, alongside the rapid development of the Internet and online applications, phishing attacks targeting users through malicious URLs have been increasingly prevalent. Traditional methods for detecting malicious URLs often rely on blacklist-based techniques. However, these techniques have significant limitations as they cannot identify new URLs. Many machine learning-based approaches have been researched and...
Author
Xiaogang LuoLiang Zhou
Format
Academic Journal
Description
In the field of network econometric data analysis, the analysis of massive URL data offers insights into the behavior of networks, the optimization of network structure, and the prevention of network attacks. Therefore, this study introduces Python web scraping technology to achieve data collection in the design of econometric data analysis software, and designs a hash split Bloom filter algorithm based on multiple eigenvalues to achieve de-duplication....
Author
K. S. JishnuB. Arthi
Format
Academic Journal
Description
The rise of cyber threats, particularly URL-based phishing attacks, has tarnished the digital age despite its unparalleled access to information. These attacks often deceive users into disclosing confidential information by redirecting them to fraudulent websites. Existing browser-based methods, predominantly relying on blacklist approaches, have failed to effectively detect phishing attacks. To counteract this issue, we propose a novel system that...
Author
Hayk GhalechyanElina IsrayelyanAvag ArakelyanGerasim HovhannisyanArman Davtyan
Format
Academic Journal
Description
Abstract Cybercriminals create phishing websites that mimic legitimate websites to get sensitive information from companies, individuals, or governments. Therefore, using state-of-the-art artificial intelligence and machine learning technologies to correctly classify phishing and legitimate URLs is imperative. We report the results of applying deterministic and probabilistic neural network models to URL classification. Key achievements of this work...
Author
S. Senthil KumarPrakash MuthusamyM. Paul Arokiadass Jerald
Format
Academic Journal
Description
Abstract Phishing websites are cybercrimes that aim to collect confidential data, including bank card numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract the elements of the websites and utilize third-party resources. One of the drawbacks of these methods is that identifying phishing characteristics takes a lot of effort and knowledge. Second, the recognition of phishing websites is delayed when third-party...
Author
Shougfta MushtaqTabassum JavedMazliham Mohd Su’ud
Format
Academic Journal
Description
With the rapid growth in the usage of the Internet, criminals have found new ways to engage in cyber-attacks. The most common and widespread attack is URL phishing. The proposed system focuses on improving phishing website detection using feature selection and ensemble learning. This model uses two datasets, DS-30 and DS-50, each with 30 and 50 features. Ensemble learning using a voting classifier was then applied to train the model, achieving more...
Author
Taha EtemMustafa Teke
Format
Academic Journal
Description
Phishing attacks continue to pose a major challenge in today’s digital world; thus, sophisticated detection techniques are required to address constantly changing tactics. In this paper, we have proposed an innovative method to identify phishing attempts using the extensive PhiUSIIL dataset. The proposed dataset comprises 134,850 legitimate URLs and 100,945 phishing URLs, providing a robust foundation for analysis. We applied the t-SNE technique...
Author
Bridget C. Ujah-OgbuaguOluwatobi Noah AkandeEmeka Ogbuju
Format
Academic Journal
Description
Abstract Website Uniform Resource Locator (URL) spoofing remains one of the ways of perpetrating phishing attacks in the twenty-first century. Hackers continue to employ URL spoofing to deceive naïve and unsuspecting consumers into releasing important personal details in malicious websites. Blacklists and rule-based filters that were once effective at reducing the risks and sophistication of phishing are no longer effective as there are over...
Author
S. RemyaManu J. PillaiKajal K. NairSomula Rama SubbareddyYong Yun Cho
Format
Academic Journal
Description
Phishing websites, mimicking legitimate counterparts, pose significant threats by stealing user information through deceptive Uniform Resource Locators (URLs). Traditional blacklists struggle to identify dynamic URLs, necessitating advanced detection mechanisms. In this study, we propose an effective approach utilizing residual pipelining for phishing URL detection. Our method extracts common URL features and sentiments, employing a residual pipeline...
Author
Ahmad Sahban RafsanjaniNorshaliza Binti KamaruddinMehran BehjatiSaad AslamAaliya SarfarazAngela Amphawan
Format
Academic Journal
Description
Malicious Uniform Resource Locators (URLs) pose a significant cybersecurity threat by carrying out attacks such as phishing and malware propagation. Conventional malicious URL detection methods, relying on blacklists and heuristics, often struggle to identify new and obfuscated malicious URLs. To address this challenge, machine learning and deep learning have been leveraged to enhance detection capabilities, albeit relying heavily on large and frequently...
Author
Fardin RastakhizMahdi EftekhariSahar Vahdati
Format
Academic Journal
Description
The uniform resource locator (URL) conveys essential information about a page’s topic, authority, and security, which significantly influences its ranking in search engine results. However, many existing URL classification methods used for real-time online inference face challenges related to time and memory complexity during preprocessing, processing, and inference stages. In environments where quick decision-making is crucial, such as cybersecurity...
Author
Manika NandaMala SaraswatPankaj Kumar Sharma
Format
Academic Journal
Description
Phishing attempts to mimic the official websites of businesses, including banks, e-commerce, government offices, and financial institutions. Phishing websites aim to collect and retrieve sensitive data from users, including passwords, credit card numbers, email addresses, personal information, and so on. The growing frequency of phishing attacks has prompted the development of numerous anti-phishing technologies. Because machine learning (ML) techniques...
Author
M. Ali AkcayolZülfü Alanoğlu
Format
Academic Journal
Description
Web, İnternet üzerinde yayınlanan çeşitli türden bilgilerin bulunduğu bir veri deposudur. Bu bilgileri üzerinde bulunduran ve birbirlerine köprülerle bağlı olan yapılara web sayfaları denir. Web tarayıcıları, web sayfaları üzerindeki köprüleri kullanarak Web’i tarayan ve sayfaları indiren programlardır. Bir arama motorunun performansı da web tarayıcısının performansına bağlıdır....
Author
Minglei LiaoXintao LiuTao Jia
Format
Academic Journal
Description
ABSTRACTIn recent decades, Digital transformation has significantly shifted human activities from physical space to cyber space. When users access the internet, uniform resource locator (URL) data are autogenerated. Using URLs, this study presents a novel framework for exploring cyber space structure from the perspectives of complex networks and activity fragmentation. Web domains within URL data are metaphorically regarded as ‘digital locations,’...
Author
Sultan AsiriYang XiaoSaleh AlzahraniShuhui LiTieshan Li
Format
Academic Journal
Description
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails. Phishing attacks steal users’ information or download and install malicious software. They are hard to detect because attackers can design a phishing message that looks legitimate to a user. This message may contain a phishing URL so that...
Author
Abdul KarimMobeen ShahrozKhabib MustofaSamir Brahim BelhaouariS. Ramana Kumar Joga
Format
Academic Journal
Description
Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet. Phishing utilizes email distortion as its underlying mechanism for tricky correspondences, followed by mock sites, to obtain the required data from people in question. Different studies have presented their...