Efficient Malicious Domain Detection Using Word Segmentation and BM Pattern Matching

被引:0
|
作者
Gupta, Sachin [1 ]
机构
[1] APEX Inst Engn & Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
BM (Boyer-Moore) Pattern; Malicious Web Pages; Classification Module; Web-Based Attacks;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
On the World Wide Web, the malicious links are highly problematic in the dissemination channels as a source code to the malware broadcasting. These suspicious malicious links gives full access to the web attackers as an instrument of web pages on internet. It is easily affected by the results of attackers on the system of victim where system is utilized easily for performing the cyber-attacks such as stealing the financial credentials, phishing-spamming, hacking and many more such web attacks. The developed system must be accurate and fast enough to detect these types of such cyber-attacks by observing the ability to find new developed malicious URLs or malicious source code contents. It is the critical task to detect the malicious contents in network of the web pages over the World Wide Web. The various malicious cyber-attacks like spamming, code phishing are done by using the malicious URLs to mount these types of cyber-attacks. Internet unlawful activities are found in Malicious Web sites as cornerstone of the Malicious URLs. The main threat is to identify these attacks so that the suspicious URLs can be easily resolved as malicious URLs along with its source code of the web pages. In this paper, a method has been proposed which is highly useful in the field of World Wide Web networking of domains for detecting the malicious URLs by using BM (Boyer-Moore) [1] string pattern matching algorithm based on word segmentation approach [2]. The nature of attacks is identified as a malicious URL or source code of the web sites questioned on the World Wide Web. The proposed approach is based on the real time system for getting suspicious URL from the DNS server followed by the detection on the basis of word segmentation of source code. The discriminative features of this system are verified by using the proposed method which gives a variety of properties including text and link in the source code as highly powerful and novel approach in the detection of suspicious URLs.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Malicious URL Detection Algorithm based on BM Pattern Matching
    Yu, Fuqiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 33 - 44
  • [2] Efficient Secure Pattern Matching With Malicious Adversaries
    Zarezadeh, Maryam
    Mala, Hamid
    Ladani, Behrouz Tork
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1407 - 1419
  • [3] A Multiple Pattern Matching Method for Malicious Code Detection
    Huang, Der-Chen
    Lo, Hung-Cheng
    Lai, Ping-Liang
    Chen, Wei-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
  • [4] An Efficient Framework for Online Malicious Domain Detection
    Cui, Jia
    Zhang, Li
    Liu, Zhaohui
    Li, Juan
    Shi, Lei
    2018 11TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2018), 2018,
  • [5] Webpage Segmentation Using Ontology and Word Matching
    Toh, Huey Jing
    Hong, Jer Lang
    NEURAL INFORMATION PROCESSING (ICONIP 2014), PT II, 2014, 8835 : 454 - 461
  • [6] Detection of Algorithmically Generated Malicious Domain Names with Feature Fusion of Meaningful Word Segmentation and N-Gram Sequences
    Chen, Shaojie
    Lang, Bo
    Chen, Yikai
    Xie, Chong
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [7] Efficient Regular Expression Pattern Matching for Network Intrusion Detection Systems using Modified Word-based Automata
    Kumar, Pawan
    Singh, Virendra
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 103 - 110
  • [8] Efficient segment pattern based method for malicious URL detection
    Lin, Hai-Lun
    Li, Yan
    Wang, Wei-Ping
    Yue, Yin-Liang
    Lin, Zheng
    Tongxin Xuebao/Journal on Communications, 2015, 36
  • [9] Efficient process-hotspot detection using range pattern matching
    Yao, H.
    Sinha, S.
    Chiang, C.
    Hong, X.
    Cai, Y.
    IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, DIGEST OF TECHNICAL PAPERS, ICCAD, 2006, : 793 - +
  • [10] Visual malware detection using local malicious pattern
    Hashem Hashemi
    Ali Hamzeh
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 1 - 14