Explore chapters and articles related to this topic
Improving Suspicious URL Detection through Ensemble Machine Learning Techniques
Published in Neeraj Mohan, Surbhi Gupta, Chuan-Ming Liu, Society 5.0 and the Future of Emerging Computational Technologies, 2022
Sanjukta Mohanty, Arup Abhinna Achary, Laki Sahu
URL refers to the global address of a resource or document. A URL can be divided into four components: a scheme, a host, a path and a query string. A scheme represents the protocol (http, https, ftp, mailto, file etc.) to be used for accessing the information from the internet and to establish secure and smooth communication. A host or domain name (www.yahoo.com) represents the destination location for the URL. A host name consists of subdomain, second-level domain and top-level domain. In Figure 13.1, the term ‘www’ represents the subdomain, the text ‘yahoo’ indicates the domain name and the term ‘com’ represents the top-level domain. The components of domain names are separated by dots and preceded with a double slash. The path name includes the files and directory that represents the location of files in the server and are separated by slashes (/project/test.html). A query string is placed after the path and gives a string of information to the file for some purpose and contains the parameter list, which includes name and value pair (param1=value1). Each query string is preceded by a question mark and separated with an ampersand (&). The components of the URL are represented in Figure 13.1.
Evolution of Phishing Attacks: Challenges and Opportunities for Humans to Adapt to the Ubiquitous Connected World
Published in Mustapha Mouloua, Peter A. Hancock, James Ferraro, Human Performance in Automated and Autonomous Systems, 2019
Aiping Xiong, Robert W. Proctor, Ninghui Li
URL shortening is a technique on the Internet that helps users share links more easily by shortening and modifying them. For example, if one enters a URL into the website bitly.com, it will generate a URL that begins with bit.ly and is followed by a short character string that is unrelated to the original URL but linked to it. Although this service is useful for people to share URLs within mobile platforms in which there are character limitations (e.g., Twitter), phishers also seize such opportunity and use these URL shortening services to mask phishing URLs so that the victims cannot determine the legitimacy of the URL (e.g., NYU IT Security, 2018). A recent work examined over 7,000 phishing short URLs in the years of 2016 and 2017 (Le Page, Jourdan, Bochmann, Flood, & Onut, 2018). It found that the short URLs had high click-through rates during an active time span on the order of hours, and the use of short URLs increased in social media platforms.
Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
Published in Journal of Experimental & Theoretical Artificial Intelligence, 2023
The user activity information stored in the user activity logs is forwarded to the feature extraction module. Here, the features for the user activity logs are extracted using the window length based on the time stamp. The features, like logon, device, file, email, and Http are extracted by the window length with respect to the time stamp of the user. The logon file contains the logoff and logon time for all the users, which effectively determines the starting and ending time. The device feature contains information regarding the device connection for the entire user. The time at which the device is connected and disconnected are specified in the device file. For the entire user, the file transfer information along with the type of files transferred is stored in the file feature. The email file contains the email exchange information, such as email size, count of emails delivered by the user, and the number of attachments. Moreover, the HTTP file feature contains the visited Uniform Resource Locator (URL), id of the machine that is visited the web page, and the keywords that are extracted from the web page content. For each user, the features are extracted based on the time stamp. Therefore, the extracted features are represented as,
Access and Experiences of Arabic Native Speakers With Disabilities on Social Media During and After the World Pandemic
Published in International Journal of Human–Computer Interaction, 2023
Zainab AlMeraj, Iyad Abu Doush, Dari Alhuwail, Shok Shama, Ahmed AlBahar, Mohammad Al-Ramahi
A study by Arrue et al. (2006) proposed the EvalAcess Mobile tool that is used to evaluate mobile web accessibility. This tool evaluates a single web page by inserting its source code or URL. It then generates a report that includes all the detected errors. Furthermore, a study by Park et al. (2014) investigated the accessibility problems of mobile devices found by people with visual impairments. The evaluation methodology, which was user testing, saw four visually impaired participants perform specific tasks. The research included two phases: The first phase was the observation of people with visual impairments while performing tasks on smartphones. The second phase was interviewing the users to understand their experience. The device used in the study was an iPhone and the screen reader was VoiceOver. The results of the study reported that participants used only basic functions of the smartphone due to the speed of typing text and the inaccessible application design while using the VoiceOver function.
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
The attacker creates the phishing URLs by making the change in the original URLs (e.g., changing the top-level domain). Prakash et al. developed Phishnet to predict the blacklisted URLs (Prakash et al. 2010). Phishnet evaluated on the dataset of 24,000 URLs and achieved 3% FPR & 5% FNR. Phishnet contains two modules, first is URL prediction and second is URL matching module. Following heuristics are used in the URL prediction module. Top-level domains (TLD) of the suspicious URL are replaced with 3,209 different TLDs resulting in child URLs that are required to be inspected.Phishnet maintains the cluster of host equivalence classes containing the same IP address and creates new URL by the combination of hostname and path.The URLs having the same directory structure are clustered, and new URLs are formed by exchanging filenames within the same cluster.The path equivalence class is generated, and query string can be exchanged to create new URLs.The New URLs are generated by substituting the organisation names in the malicious URLs. The technique uses 64 most targeted brand used by attackers.