LSTM RNN: detecting exploit kits using redirection chain sequences
暂无分享,去创建一个
Sakir Sezer | Domhnall Carlin | Philip O'Kane | Jonah Burgess | S. Sezer | Domhnall Carlin | Philip O'Kane | Jonah Burgess
[1] Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences , 2018, IEICE Trans. Inf. Syst..
[2] Shiraishi Yoshiaki,et al. A Malicious Web Site Identification Technique Using Web Structure Clustering , 2017 .
[3] Antonio Nucci,et al. Detecting malicious HTTP redirections using trees of user browsing activity , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[4] Masayuki Murata,et al. Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities , 2019, IEICE Trans. Inf. Syst..
[5] Martin Grill,et al. Exploit Kit Website Detection Using HTTP Proxy Logs , 2016, ICNCC '16.
[6] Ralf C. Staudemeyer,et al. Understanding LSTM - a tutorial into Long Short-Term Memory Recurrent Neural Networks , 2019, ArXiv.
[7] Fabio Massacci,et al. Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts , 2013, ESSoS.
[8] Sakir Sezer,et al. You Could Be Mine(d): The Rise of Cryptojacking , 2020, IEEE Security & Privacy.
[9] Sakir Sezer,et al. REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[10] Yuta Takata,et al. MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[11] K. P. Soman,et al. Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..
[12] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[13] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[14] Wei Ye,et al. Anomaly-Based Web Attack Detection: A Deep Learning Approach , 2017, ICNCC.
[15] Jiyong Jang,et al. Detecting Malicious Exploit Kits using Tree-based Similarity Searches , 2016, CODASPY.
[16] Ma,et al. The Decline of Exploit Kits as an Exploitation Strategy , 2018 .
[17] Sudsanguan Ngamsuriyaroj,et al. Classification of Exploit-Kit behaviors via machine learning approach , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[18] Roberto Perdisci,et al. WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths , 2015, USENIX Security Symposium.
[19] Navneet Goyal,et al. A Comparison of Machine Learning Attributes for Detecting Malicious Websites , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).
[20] Ayumu Kubota,et al. An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors , 2014, 2014 Ninth Asia Joint Conference on Information Security.
[21] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[22] Nazife Baykal,et al. I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains , 2019 .
[23] Ren-Hung Hwang,et al. An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level , 2019, Applied Sciences.
[24] Liang Liu,et al. Research on Malicious JavaScript Detection Technology Based on LSTM , 2018, IEEE Access.