A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
In recent years, the advance growth of cybercrime has become an urgent issue to the security authorities. With the improvement of web technologies enable attackers to launch the web-based attacks and other malicious code easily without having prior expert knowledge. Recently, JavaScript has become t...
| Main Authors: | Wan Nurulsafawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IOP Publishing
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/28809/ http://umpir.ump.edu.my/id/eprint/28809/1/A%20survey%20on%20current%20malicious%20javascript%20behavior%20of%20infected.pdf |
Similar Items
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023)
by: Anwar Razlan, Rasali
Published: (2023)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Malicious software prevention for Muslim communities
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
Web page recommendation model for web personalization
by: Ahmad, Abdul Manan, et al.
Published: (2004)
by: Ahmad, Abdul Manan, et al.
Published: (2004)
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A survey on technique for solving web page classification problem
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
A malicious URLs detection system using optimization and machine learning classifiers
by: Lee, Ong Vienna, et al.
Published: (2020)
by: Lee, Ong Vienna, et al.
Published: (2020)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
A Web Site for Kids to Develop Education Game in Html 5 and Javascript
by: Siew, Phek Xi
Published: (2016)
by: Siew, Phek Xi
Published: (2016)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Improving malicious detection rate for Facebook application in OSN platform
by: Angamuthu, Laavanya
Published: (2018)
by: Angamuthu, Laavanya
Published: (2018)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
Use Word Cloud Image Of Web Page Text Content On Convolutional Neural Network (CNN) For Classification Of Web Pages
by: Siti Hawa, Apandi, et al.
Published: (2024)
by: Siti Hawa, Apandi, et al.
Published: (2024)
Using normalize time spent on a Web page for Web personalization
by: Ahmad, Abdul Manan, et al.
Published: (2004)
by: Ahmad, Abdul Manan, et al.
Published: (2004)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Evaluation of P2P file sharing system in the presence of malicious nodes
by: Janbi, Nourah
Published: (2015)
by: Janbi, Nourah
Published: (2015)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
A new algorithm to measure relevance among Web pages
by: Sadi, M.S., et al.
Published: (2006)
by: Sadi, M.S., et al.
Published: (2006)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Term frequency-information content for focused crawling to predict relevant web pages.
by: Pesaranghader, Ali, et al.
Published: (2013)
by: Pesaranghader, Ali, et al.
Published: (2013)
Improved web page recommender system based on web usage mining
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
by: Alfagi, Abdalrahman, et al.
Published: (2016)
by: Alfagi, Abdalrahman, et al.
Published: (2016)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Similar Items
-
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019) -
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
by: Anwar Razlan, Rasali
Published: (2023) -
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010) -
Malicious software prevention for Muslim communities
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)