Two-Stage Classification Model to Detect Malicious Web Pages

被引:6
|
作者
Van Lam Le [1 ]
Welch, Ian [1 ]
Gao, Xiaoying [1 ]
Komisarczuk, Peter [1 ]
机构
[1] Victoria Univ Wellington, Sch Engn & Comp Sci, Wellington 6140, New Zealand
来源
25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011) | 2011年
关键词
Internet security; drive-by-download; malicious web page;
D O I
10.1109/AINA.2011.71
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impacts. Detecting and analyzing them is very costly because of their qualities and complexities. There has been some research approaches carried out in order to detect them. The approaches can be classified into two main groups based on their used analysis features: static feature based and run-time feature based approaches. While static feature based approach shows it strengthens as light-weight system, run-time feature based approach has better performance in term of detection accuracy. This paper presents a novel two-stage classification model to detect malicious web pages. Our approach divided detection process into two stages: Estimating maliciousness of web pages and then identifying malicious web pages. Static features are light-weight but less valuable so they are used to identify potential malicious web pages in the first stage. Only potential malicious web pages are forwarded to the second stage for further investigation. On the other hand, run-time features are costly but more valuable so they are used in the final stage to identify malicious web pages.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 50 条
  • [21] A two-stage approach to fingerprint classification
    Ping, Y
    Wang, LM
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON INTELLIGENT MECHATRONICS AND AUTOMATION, 2004, : 918 - 921
  • [22] A TWO-STAGE IMPROVED ANT COLONY OPTIMIZATION BASED FEATURE SELECTION FOR WEB CLASSIFICATION
    Xu, Jun
    Li, Guangyao
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (06): : 1851 - 1863
  • [23] Two-Stage Deep Learning Model for Automated Segmentation and Classification of Splenomegaly
    Meddeb, Aymen
    Kossen, Tabea
    Bressem, Keno K.
    Molinski, Noah
    Hamm, Bernd
    Nagel, Sebastian N.
    CANCERS, 2022, 14 (22)
  • [24] Classification of malicious Web sessions
    Goseva-Popstojanova, Katerina
    Anastasovski, Goce
    Pantev, Risto
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [25] Detection of malicious web pages based on hybrid analysis
    Wang, Rong
    Zhu, Yan
    Tan, Jiefan
    Zhou, Binbin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 68 - 74
  • [26] SPIDERNET: AN INTERACTION TOOL FOR PREDICTING MALICIOUS WEB PAGES
    Krishnaveni, S.
    Sathiyakumari, K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [27] EVILSEED: A Guided Approach to Finding Malicious Web Pages
    Invernizzi, Luca
    Comparetti, Paolo Milani
    Benvenuti, Stefano
    Kruegel, Christopher
    Cova, Marco
    Vigna, Giovanni
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 428 - 442
  • [28] Effective Analysis, Characterization, and Detection of Malicious Web Pages
    Eshete, Birhanu
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 355 - 359
  • [29] Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation
    Xuan, Shichang
    Man, Dapeng
    Wang, Wei
    Zhang, Jiangchuan
    Yang, Wu
    Du, Xiaojiang
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [30] A Survey on Techniques to Detect Malicious Activites on Web
    Sait, Abdul Rahaman Wahab
    Arunadevi, M.
    Meyyappan, T.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (02) : 192 - 198