Academic literature on the topic 'Drive-by Download Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Drive-by Download Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Drive-by Download Detection"
Aldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 16–28. http://dx.doi.org/10.4018/ijisp.2017100102.
Full textDe Santis, Alfredo, Giancarlo De Maio, and Umberto Ferraro Petrillo. "Using HTML5 to prevent detection of drive-by-download web malware." Security and Communication Networks 8, no. 7 (August 21, 2014): 1237–55. http://dx.doi.org/10.1002/sec.1077.
Full textHan, KyungHyun, and Seong Oun Hwang. "Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens." Applied Sciences 10, no. 17 (September 3, 2020): 6116. http://dx.doi.org/10.3390/app10176116.
Full textP., Tatwadarshi, J. W. Bakal, and Neha Jain. "A Brief Survey of Detection and Mitigation Techniques for Clickjacking and Drive-by Download Attacks." International Journal of Computer Applications 138, no. 2 (March 17, 2016): 44–48. http://dx.doi.org/10.5120/ijca2016908785.
Full textSong, Xuyan, Chen Chen, Baojiang Cui, and Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model." Applied Sciences 10, no. 10 (May 16, 2020): 3440. http://dx.doi.org/10.3390/app10103440.
Full textBux, Khuda, Muhammad Yousaf, Akhtar Hussain Jalbani, and Komal Batool. "Detection of Malicious Servers for Preventing Client-Side Attacks." January 2021 40, no. 1 (January 1, 2021): 230–40. http://dx.doi.org/10.22581/muet1982.2101.20.
Full textRai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Full text"ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks." Journal of Information Processing Systems, 2015. http://dx.doi.org/10.3745/jips.03.0045.
Full textChonofsky, Mark, Saulo H. P. de Oliveira, Konrad Krawczyk, and Charlotte M. Deane. "The evolution of contact prediction: Evidence that contact selection in statistical contact prediction is changing." Bioinformatics, November 6, 2019. http://dx.doi.org/10.1093/bioinformatics/btz816.
Full text"Detection of Malicious Uniform Resource Locator." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 41–47. http://dx.doi.org/10.35940/ijrte.a1265.078219.
Full textDissertations / Theses on the topic "Drive-by Download Detection"
Xu, Kui. "Anomaly Detection Through System and Program Behavior Modeling." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/51140.
Full textPh. D.
Nelms, Terry Lee. "Improving detection and annotation of malware downloads and infections through deep packet inspection." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54941.
Full textŠulák, Ladislav. "Detekce škodlivých webových stránek pomocí strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385990.
Full textHuang, Jhe-Jhun, and 黃哲諄. "Detecting Drive-by Download Based on Reputation System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/76445739504789070296.
Full text國立中山大學
資訊管理學系研究所
100
Drive-by download is a sort of network attack which uses different techniques to plant malicious codes in their computers. It makes the traditional intrusion detection systems and firewalls nonfunctional in the reason that those devices could not detect web-based threats. The Crawler-based approach has been proposed by many studies to discover drive-by download sites. However, the Crawler-based approach could not simulate the real user behavior of web browsing when drive-by download attack happens. Therefore, this study proposes a new approach to detect drive-by download by sniffing HTTP flow. This study uses reputation system to improve the efficiency of client honeypots, and adjusts client honeypots to process the raw data of HTTP flow. In the experiment conducted in real network environment, this study show the performance of a single client honeypot could reach average 560,000 HTTP success access log per day. Even in the peak traffic, this mechanism reduced the process time to 22 hours, and detected drive-by download sites that users were actually browsing. Reputation system in this study is applicable to varieties of domain names because it does not refer to online WHOIS database. It established classification model on machine learning in 12 features. The correct classification rate of the reputation system applied in this study is 90.9%. Compared with other Reputation System studies, this study not only extract features from DNS A-Type but also extract features from DNS NS-Type. The experiment results show the Error Rate of the new features from DNS NS-Type is only 19.03%.
Chiang, Ming-Chung, and 江明駿. "A Hierarchical Classifier on Web Proxies for Detecting Drive-by Download Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/01860436264285021593.
Full textBook chapters on the topic "Drive-by Download Detection"
Ghafir, Ibrahim, and Vaclav Prenosil. "Malicious File Hash Detection and Drive-by Download Attacks." In Advances in Intelligent Systems and Computing, 661–69. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2517-1_63.
Full textNappa, Antonio, M. Zubair Rafique, and Juan Caballero. "Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting." In Detection of Intrusions and Malware, and Vulnerability Assessment, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39235-1_1.
Full textVyawahare, Madhura, and Madhumita Chatterjee. "Survey on Detection and Prediction Techniques of Drive-by Download Attack in OSN." In Algorithms for Intelligent Systems, 453–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3242-9_42.
Full textEndicott-Popovsky, Barbara, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O’Neil, and Chiraag Aval. "Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks." In Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 138–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02812-0_17.
Full textPoornachandran, Prabaharan, S. Praveen, Aravind Ashok, Manu R. Krishnan, and K. P. Soman. "Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines." In Advances in Intelligent Systems and Computing, 129–37. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3156-4_13.
Full textIbrahim, Saeed, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi. "Detection and Analysis of Drive-by Downloads and Malicious Websites." In Communications in Computer and Information Science, 72–86. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_6.
Full textEgele, Manuel, Peter Wurzinger, Christopher Kruegel, and Engin Kirda. "Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment, 88–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02918-9_6.
Full textZhang, Haibo, Chaoshun Zuo, Shanqing Guo, Lizhen Cui, and Jun Chen. "SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment." In Lecture Notes in Computer Science, 292–303. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11167-4_29.
Full textAldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." In Cognitive Analytics, 1598–611. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2460-2.ch082.
Full textConference papers on the topic "Drive-by Download Detection"
Kikuchi, Hiroaki, Hiroaki Matsumoto, and Hiroshi Ishii. "Automated Detection of Drive-By Download Attack." In 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2015. http://dx.doi.org/10.1109/imis.2015.71.
Full textCherukuri, Manoj, Srinivas Mukkamala, and Dongwan Shin. "Detection of Plugin Misuse Drive-By Download Attacks using Kernel Machines." In 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. ICST, 2014. http://dx.doi.org/10.4108/icst.collaboratecom.2014.257749.
Full textCova, Marco, Christopher Kruegel, and Giovanni Vigna. "Detection and analysis of drive-by-download attacks and malicious JavaScript code." In the 19th international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1772690.1772720.
Full textJodavi, Mehran, Mahdi Abadi, and Elham Parhizkar. "DbDHunter: An ensemble-based anomaly detection approach to detect drive-by download attacks." In 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 2015. http://dx.doi.org/10.1109/iccke.2015.7365841.
Full textTakada, Tetsuji, and Katsuhiro Amako. "A Visual Approach to Detecting Drive-by Download Attacks." In VINCI '15: The 8th International Symposium on Visual Information Communication and Interaction. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2801040.2801070.
Full textTyagi, Akshay, Laxmi Ahuja, Sunil Kumar Khatri, and Subhranil Som. "Prevention of Drive by Download Attack (URL Malware Detector)." In 2019 Third International Conference on Inventive Systems and Control (ICISC). IEEE, 2019. http://dx.doi.org/10.1109/icisc44355.2019.9036341.
Full textAL-Taharwa, Ismail Adel, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, and Shyi-Ming Chen. "Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.392.
Full textMatsunaka, Takashi, Junpei Urakawa, and Ayumu Kubota. "Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web." In 2013 Eighth Asia Joint Conference on Information Security (ASIA JCIS). IEEE, 2013. http://dx.doi.org/10.1109/asiajcis.2013.15.
Full textVan Lam Le, Ian Welch, Xiaoying Gao, and Peter Komisarczuk. "Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand." In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/lcn.2013.6761254.
Full text