SlideShare a Scribd company logo
1 of 26
DETECTION OF MALICIOUS URL
Guided by
Prof. Kalpita Mane
(Guide E&TC)
Presented by
Manash Pratim Saikia
M.E. (VLSI & Embedded system)
A.Y. 2022-23
CONTENT
 Introduction
 Literature Survey
 Problem Definition
 Objectives
 Methodology
 Conclusion
 Reference
INTRODUCTION
 A lot of rogue websites trick users into revealing
sensitive information which lead to theft of money or
identity or installing malware in the user’s system
 URL (Uniform Reource Locator) is the global address
of documents (resources) on the world wide web.
 A URL has two components
 protocol identifier
 resource name(specifies the IP address or the
domain name where resource is located)
INTRODUCTION
 Types of attacks using malicious URLs include
 Drive by download
Phishing and Social Engineering
Spam
 Drive by Download is unintentional download of
malware upon just visiting the URL.These attacks are
carried out by exploiting vulnerabilities in plug ins or
inserting malicious code through JavaScript
INTRODUCTION
 Phishing and social engineering attacks trick the user
into revealing private information by pretending to be
genuine web pages
 Spam is the usage of unsolicited message for the
purpose of advertising or phishing
LITERATURE SURVEY
Title of
Paper
Details of
Publication
Description
Malicious
URL
detection
using
Machine
Learning :
A survey
Doyen
Sahoo,Chengh
ao Liu &
Steven CH Hoi
August 2019
The authors presented a
survey on malicious URL
detection using machine
learning techniques. They
discussed the existing
studies for malicious URL
detection paritcularly in the
forms of developing new
feature representation &
designing new learning
algorithm
LITERATURE SURVEY
Title of
Paper
Details of
Publication
Description
Automatic
Detection for
JavaScript
obfuscation.
Attacks in
web pages
through
string
pattern
analysis
Choi,Young
Han,Tae
Ghyoon Kim
, Seok Jin
Choi .
The author presents an
analysis system to
detect lexical and string
obfuscation in Java
malware. They identify a
set of 11 features that
characterize obfuscated
code and use it to train a
machine learning
classifier
LITERATURE SURVEY
Title of Paper Details of
Publication
Description
Kopis: Detecting
malware
domains at the
upper DNS
Hierarchy
Antonakakis
,Manos
The author s propose
a novel detection
system called Kopis
for detecting
malware related
domain names .
Kopis passively
monitors DNS traffic
at upper levels of
DNS hierarchy
PROBLEM DEFINITION
The current situation has required significant
information security since many people have suffered
from leakage of personal information
Detection of malicious URLs and identification of threat
types using machine learning are critical to thwart cyber
attacks like spamming,phishing and malware
OBJECTIVES
The main objective of our work is to
 Survey a varying trend of malicious URL detection
 To analyse a variety of detection techniques
changing over time
METHODOLOGY
 The categories of strategies used for detecting
malicious URLs are
 Blacklists( & Heuristics )
 Machine Learning
METHODOLOGY
 Blacklisting or Heuristic Approaches: These
approaches maintain a list of URLs that are known to
be malicious . Whenever a new URL is visited , a
database lookup is performed . If the URL is present in
the blacklist ,it is considered to be malicious and then
a warning will be generated ; else if is assumed to be
benign .Blacklisting suffers from the inability to
maintain an exhaustive list of all possible malicious
URLs as new URLs can be easily generated daily, thus
making it impossible for them to detect new threats.
METHODOLOGY
 This is particularly of critical concern when attackers
generate new URLs algorithmically and can thus bypass
all blacklists. Despite several problems faced by
blacklisting , due to their simplicity and efficiency , they
continue to be one of the most commonly used
techniques by many anti-virus systems today.
METHODOLOGY
Heuristic approaches are a kind of extension of
Blacklist methods, wherein the idea is to create a
blacklist of signatures. Common attacks are identified
and a signature is assigned to this attack type. Intrusion
Detection Systems can scan the web pages for such
signatures and raise a flag if some suspicious behaviour
is found .These methods have better generalization
capabilities than blacklisting ,as they have the ability to
detect threats in new URLs as well. However, such
methods can be designed for only a limited number of
common threats , and cannot generalize to all types of
(novel) attacks. Moreover using obfuscation techniques ,
it is not difficult to bypass them
METHODOLOGY
A more specific version of heuristic approaches is
through analysis of execution dynamics of the webpage.
Here also, the idea is to look for a signature of malicious
activity such as unusual process creation, repeated
redirection etc.These methods require visiting the
webpage and thus the URLs actually can make an
attack. As a result , such techniques are often
implemented in controlled environment like a disposable
virtual machine .Such techniques are very resource
intensive and require all execution of the code .Another
drawback is that websites may not launch an attach
immediately after being visited and thus may go
undetected.
METHODOLOGY
Machine Learning Approaches: They analyze
information of a URL and its corresponding websites by
extracting good feature representations of URLs and
training a prediction model on training data of both
malicious and benign URLs . There are 2 types of
features – static features and dynamic features . In static
analysis we perform anlaysis of webpage based on
information available without extracting URL( i.e.
executing Java Script or other code). The features
extracted include lexical features from URL string , info
about host , and sometimes even HTML and Java Script
content. Since no execution is required , these methods
are safer than Dynamic methods.
METHODOLOGY
The underlying assumption is that distribution of these
features is different for malicious and benign URLs .
Using this distribution information,a prediction model can
be built , which can make predictions on new URLs. Due
to relatively safer environment for extracting important
information , and ability to generalize all types of
threats, static analysis techniques have been extensively
explored by applying machine learning techniques .
Dynamic analysis techniques include monitoring the
behaviour of systems which are potential victims , to
look for any anomaly. These include which monitor the
system call sequences for abnormal behaviour
METHODOLOGY
FEATURES: We develop 3 different categories of
features to detect malicious URLs
1. URL lexical features:
We approach the URL as an NLP problem .We use
term frequency – inverse document frequency i.e. tf- idf
to weigh the importance of a token in the URL as a way
to associate URL tokens with labels. Tokens include
anything in the URL, including both the domain and the
path .td-idf can be defined as
 tf*idf = tf (t,d)*idf(t,D) where we define tf and idf
 tf (t,d) = f (t,d) / max {f (w,d) : w subset d}
Idf (t,D) = log mag D/mag{d subst D: t subset D}
METHODOLOGY
We also exploit the hierarchical nature of the
subdomains by splitting along each separator and
saving a bigram consisting of any subdomain plus the
top level domain . We hope to run across phishing
patterns or other suspicious URLs in the process
2. Source code features: Java Script exploits are
typically obfuscated to prevent detection by automated
or manual analysis . Here is an example of one
exploitative script we found in our malicious sample
METHODOLOGY
{k=i;s+=String["fro"+"mCh"+"arCode"](n[k]/(i-
h*Math[f](i/h)+016));} if(018-0xf===3)eval(s);}
Fortunately, we are able to use the salience of obfuscation as a
proxy for exploitative behavior
Attackers use special characters to encode script, either as
direct ASCII or transformed by some simple character
-to-character function:
document.write(unescape(’ %3C%68%74%6D%6C%20
%6C%61%6E%67%3D%22
%65%6E%22%20%6...
METHODOLOGY
Thus, we can use the ratio of special character
subsequences (non English for ”en” websites) to script
length.
In addition, attackers who choose to reconstruct
functions before
calling them require the use of special functions, such as
fromCharCode, eval, document.write, escape, etc.
They can also include the malicious code in an iframe.
We count these keywords and use them as one feature
METHODOLOGY
3. Network features :
Although we have explored a variety of network features
including latency, DNS query data, domain registry
data, and payload size, we have only captured
payload size for our tests. Executable can be arbitrarily
long, and obfuscated script may add to payload size as
well.
METHODOLOGY
Attacker strategy :
The growing threat to mobile web users could be
mitigated by automatic URL detection.By using a trained
SVM, one could check URLs fast enough to deploy in a
realtime service
This means users can use a preemptive service without
impacting their mobile experience As the old saying
Goes an ounce of prevention is worth a pound of cure
but only if the solution is palatable. Attackers may
certainly make tradeoffs to outwit the features we have
selected. However, such elusion isn’t free. For example,
using more legitimate sounding URLs in phishing
attempts may bypass suspicious
METHODOLOGY
bigram detection, but may result in fewer click-throughs
by scrupulous users. Or, reducing special char code
sequences in obfuscation may work, but only by
increasing script size or by using less obfuscation and
risking detection by malicious code pattern detectors.
Our hope is that by adding the appropriate features, a
machine learning based system would be able to force
attackers to make tradeoffs in web-based attacks.
CONCLUSION
By using a trained SVM, it is possible to provide a
realtime service to check malware URLs, regardless of
the browsing device used. In general, using a machine
learning approach to discover malicious URLs and web
attackers is a potentially significant approach, especially
when considering the scale at which machines
themselves have been used to automatically generate,
obfuscate, or permute attacks.We hope to see more
research put forward in this endeavor to further reduce
the space of feasible attacks.
REFERENCE
[1] Antonakakis, Manos. ”Kopis: Detecting Malware
Domains at
theUpperDNSHierarchy.”http://static.usenix.org/events/s
ec11/tech/slides/antonakakis.pdf.
[2] Choi, YoungHan, TaeGhyoon Kim, SeokJin Choi .
Automatic Detection for JavaScript Obfuscation Attacks
in Web Pages through String Pattern Analysis.
http://www.sersc.org/journals/IJSIA/vol4 no2 2010/2.pdf.
[3] Doyen Sahoo,Chenghao Liu , Steven CH.Hoi2019 “
Malicious URL Detection Using Machine Learning : A
Survey Aug 2019 ,37 pages

More Related Content

What's hot

Smart Fire Detection using Pi and AWS
Smart Fire Detection using Pi and AWSSmart Fire Detection using Pi and AWS
Smart Fire Detection using Pi and AWSakshaykokane09
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless CommunicationDipaloke Arunodoy
 
Density Based Traffic signal system using microcontroller
Density Based Traffic signal system using microcontrollerDensity Based Traffic signal system using microcontroller
Density Based Traffic signal system using microcontrollerkrity kumari
 
Emergency vehicles detection and special road system ppt
Emergency vehicles detection and special road system pptEmergency vehicles detection and special road system ppt
Emergency vehicles detection and special road system pptRejetiPrathyusha
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxGYamini22
 
introducción a Machine Learning
introducción a Machine Learningintroducción a Machine Learning
introducción a Machine Learningbutest
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Grigory Sapunov
 
Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying Ziar Khan
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection PresentationSaurabh Kawli
 
Load runner & win runner
Load runner & win runnerLoad runner & win runner
Load runner & win runnerHimanshu
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.AasimAhmedKhanJawaad
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationMrityunjaya Chauhan
 

What's hot (20)

Smart Fire Detection using Pi and AWS
Smart Fire Detection using Pi and AWSSmart Fire Detection using Pi and AWS
Smart Fire Detection using Pi and AWS
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Density Based Traffic signal system using microcontroller
Density Based Traffic signal system using microcontrollerDensity Based Traffic signal system using microcontroller
Density Based Traffic signal system using microcontroller
 
Emergency vehicles detection and special road system ppt
Emergency vehicles detection and special road system pptEmergency vehicles detection and special road system ppt
Emergency vehicles detection and special road system ppt
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
introducción a Machine Learning
introducción a Machine Learningintroducción a Machine Learning
introducción a Machine Learning
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018
 
Car safety system
Car safety systemCar safety system
Car safety system
 
Women security application
Women security applicationWomen security application
Women security application
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection Presentation
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Load runner & win runner
Load runner & win runnerLoad runner & win runner
Load runner & win runner
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 

Similar to detection of malicious URLs.pptx

MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET Journal
 
State of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsState of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsIOSRjournaljce
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionDaniel Liu
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapTushar Shinde
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLSUSING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLSAM Publications,India
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing WebsitesIRJET Journal
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...csandit
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...cscpconf
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxrakhicse
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET Journal
 

Similar to detection of malicious URLs.pptx (20)

MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
 
State of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsState of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLs
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing Map
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLSUSING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS
USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing Websites
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 

Recently uploaded

定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxLesterJayAquino
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一fjjwgk
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewSheldon Byron
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx review
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 

detection of malicious URLs.pptx

  • 1. DETECTION OF MALICIOUS URL Guided by Prof. Kalpita Mane (Guide E&TC) Presented by Manash Pratim Saikia M.E. (VLSI & Embedded system) A.Y. 2022-23
  • 2. CONTENT  Introduction  Literature Survey  Problem Definition  Objectives  Methodology  Conclusion  Reference
  • 3. INTRODUCTION  A lot of rogue websites trick users into revealing sensitive information which lead to theft of money or identity or installing malware in the user’s system  URL (Uniform Reource Locator) is the global address of documents (resources) on the world wide web.  A URL has two components  protocol identifier  resource name(specifies the IP address or the domain name where resource is located)
  • 4. INTRODUCTION  Types of attacks using malicious URLs include  Drive by download Phishing and Social Engineering Spam  Drive by Download is unintentional download of malware upon just visiting the URL.These attacks are carried out by exploiting vulnerabilities in plug ins or inserting malicious code through JavaScript
  • 5. INTRODUCTION  Phishing and social engineering attacks trick the user into revealing private information by pretending to be genuine web pages  Spam is the usage of unsolicited message for the purpose of advertising or phishing
  • 6. LITERATURE SURVEY Title of Paper Details of Publication Description Malicious URL detection using Machine Learning : A survey Doyen Sahoo,Chengh ao Liu & Steven CH Hoi August 2019 The authors presented a survey on malicious URL detection using machine learning techniques. They discussed the existing studies for malicious URL detection paritcularly in the forms of developing new feature representation & designing new learning algorithm
  • 7. LITERATURE SURVEY Title of Paper Details of Publication Description Automatic Detection for JavaScript obfuscation. Attacks in web pages through string pattern analysis Choi,Young Han,Tae Ghyoon Kim , Seok Jin Choi . The author presents an analysis system to detect lexical and string obfuscation in Java malware. They identify a set of 11 features that characterize obfuscated code and use it to train a machine learning classifier
  • 8. LITERATURE SURVEY Title of Paper Details of Publication Description Kopis: Detecting malware domains at the upper DNS Hierarchy Antonakakis ,Manos The author s propose a novel detection system called Kopis for detecting malware related domain names . Kopis passively monitors DNS traffic at upper levels of DNS hierarchy
  • 9. PROBLEM DEFINITION The current situation has required significant information security since many people have suffered from leakage of personal information Detection of malicious URLs and identification of threat types using machine learning are critical to thwart cyber attacks like spamming,phishing and malware
  • 10. OBJECTIVES The main objective of our work is to  Survey a varying trend of malicious URL detection  To analyse a variety of detection techniques changing over time
  • 11. METHODOLOGY  The categories of strategies used for detecting malicious URLs are  Blacklists( & Heuristics )  Machine Learning
  • 12. METHODOLOGY  Blacklisting or Heuristic Approaches: These approaches maintain a list of URLs that are known to be malicious . Whenever a new URL is visited , a database lookup is performed . If the URL is present in the blacklist ,it is considered to be malicious and then a warning will be generated ; else if is assumed to be benign .Blacklisting suffers from the inability to maintain an exhaustive list of all possible malicious URLs as new URLs can be easily generated daily, thus making it impossible for them to detect new threats.
  • 13. METHODOLOGY  This is particularly of critical concern when attackers generate new URLs algorithmically and can thus bypass all blacklists. Despite several problems faced by blacklisting , due to their simplicity and efficiency , they continue to be one of the most commonly used techniques by many anti-virus systems today.
  • 14. METHODOLOGY Heuristic approaches are a kind of extension of Blacklist methods, wherein the idea is to create a blacklist of signatures. Common attacks are identified and a signature is assigned to this attack type. Intrusion Detection Systems can scan the web pages for such signatures and raise a flag if some suspicious behaviour is found .These methods have better generalization capabilities than blacklisting ,as they have the ability to detect threats in new URLs as well. However, such methods can be designed for only a limited number of common threats , and cannot generalize to all types of (novel) attacks. Moreover using obfuscation techniques , it is not difficult to bypass them
  • 15. METHODOLOGY A more specific version of heuristic approaches is through analysis of execution dynamics of the webpage. Here also, the idea is to look for a signature of malicious activity such as unusual process creation, repeated redirection etc.These methods require visiting the webpage and thus the URLs actually can make an attack. As a result , such techniques are often implemented in controlled environment like a disposable virtual machine .Such techniques are very resource intensive and require all execution of the code .Another drawback is that websites may not launch an attach immediately after being visited and thus may go undetected.
  • 16. METHODOLOGY Machine Learning Approaches: They analyze information of a URL and its corresponding websites by extracting good feature representations of URLs and training a prediction model on training data of both malicious and benign URLs . There are 2 types of features – static features and dynamic features . In static analysis we perform anlaysis of webpage based on information available without extracting URL( i.e. executing Java Script or other code). The features extracted include lexical features from URL string , info about host , and sometimes even HTML and Java Script content. Since no execution is required , these methods are safer than Dynamic methods.
  • 17. METHODOLOGY The underlying assumption is that distribution of these features is different for malicious and benign URLs . Using this distribution information,a prediction model can be built , which can make predictions on new URLs. Due to relatively safer environment for extracting important information , and ability to generalize all types of threats, static analysis techniques have been extensively explored by applying machine learning techniques . Dynamic analysis techniques include monitoring the behaviour of systems which are potential victims , to look for any anomaly. These include which monitor the system call sequences for abnormal behaviour
  • 18. METHODOLOGY FEATURES: We develop 3 different categories of features to detect malicious URLs 1. URL lexical features: We approach the URL as an NLP problem .We use term frequency – inverse document frequency i.e. tf- idf to weigh the importance of a token in the URL as a way to associate URL tokens with labels. Tokens include anything in the URL, including both the domain and the path .td-idf can be defined as  tf*idf = tf (t,d)*idf(t,D) where we define tf and idf  tf (t,d) = f (t,d) / max {f (w,d) : w subset d} Idf (t,D) = log mag D/mag{d subst D: t subset D}
  • 19. METHODOLOGY We also exploit the hierarchical nature of the subdomains by splitting along each separator and saving a bigram consisting of any subdomain plus the top level domain . We hope to run across phishing patterns or other suspicious URLs in the process 2. Source code features: Java Script exploits are typically obfuscated to prevent detection by automated or manual analysis . Here is an example of one exploitative script we found in our malicious sample
  • 20. METHODOLOGY {k=i;s+=String["fro"+"mCh"+"arCode"](n[k]/(i- h*Math[f](i/h)+016));} if(018-0xf===3)eval(s);} Fortunately, we are able to use the salience of obfuscation as a proxy for exploitative behavior Attackers use special characters to encode script, either as direct ASCII or transformed by some simple character -to-character function: document.write(unescape(’ %3C%68%74%6D%6C%20 %6C%61%6E%67%3D%22 %65%6E%22%20%6...
  • 21. METHODOLOGY Thus, we can use the ratio of special character subsequences (non English for ”en” websites) to script length. In addition, attackers who choose to reconstruct functions before calling them require the use of special functions, such as fromCharCode, eval, document.write, escape, etc. They can also include the malicious code in an iframe. We count these keywords and use them as one feature
  • 22. METHODOLOGY 3. Network features : Although we have explored a variety of network features including latency, DNS query data, domain registry data, and payload size, we have only captured payload size for our tests. Executable can be arbitrarily long, and obfuscated script may add to payload size as well.
  • 23. METHODOLOGY Attacker strategy : The growing threat to mobile web users could be mitigated by automatic URL detection.By using a trained SVM, one could check URLs fast enough to deploy in a realtime service This means users can use a preemptive service without impacting their mobile experience As the old saying Goes an ounce of prevention is worth a pound of cure but only if the solution is palatable. Attackers may certainly make tradeoffs to outwit the features we have selected. However, such elusion isn’t free. For example, using more legitimate sounding URLs in phishing attempts may bypass suspicious
  • 24. METHODOLOGY bigram detection, but may result in fewer click-throughs by scrupulous users. Or, reducing special char code sequences in obfuscation may work, but only by increasing script size or by using less obfuscation and risking detection by malicious code pattern detectors. Our hope is that by adding the appropriate features, a machine learning based system would be able to force attackers to make tradeoffs in web-based attacks.
  • 25. CONCLUSION By using a trained SVM, it is possible to provide a realtime service to check malware URLs, regardless of the browsing device used. In general, using a machine learning approach to discover malicious URLs and web attackers is a potentially significant approach, especially when considering the scale at which machines themselves have been used to automatically generate, obfuscate, or permute attacks.We hope to see more research put forward in this endeavor to further reduce the space of feasible attacks.
  • 26. REFERENCE [1] Antonakakis, Manos. ”Kopis: Detecting Malware Domains at theUpperDNSHierarchy.”http://static.usenix.org/events/s ec11/tech/slides/antonakakis.pdf. [2] Choi, YoungHan, TaeGhyoon Kim, SeokJin Choi . Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis. http://www.sersc.org/journals/IJSIA/vol4 no2 2010/2.pdf. [3] Doyen Sahoo,Chenghao Liu , Steven CH.Hoi2019 “ Malicious URL Detection Using Machine Learning : A Survey Aug 2019 ,37 pages

Editor's Notes

  1. tu
  2. tu
  3. tu
  4. tu
  5. tu
  6. tu
  7. tu
  8. tu
  9. tu