Map Reduce Implementation for Malicious Websites Classification

  title={Map Reduce Implementation for Malicious Websites Classification},
  author={Maminur Islam and Subash Poudyal and Kishor Datta Gupta},
  journal={International Journal of Network Security \& Its Applications},
Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this… 
1 Citations

Figures and Tables from this paper

Analyzing Various Techniques to Safeguard user Sensitive Data
This paper will provide the overall view about the challenges faced during the data storage, data generation and processing in distributed and cloud environment.


Effective analysis, characterization, and detection of malicious web pages
This paper proposed a holistic approach that leverages static analysis, dynamic analysis, machine learning, and evolutionary searching and optimization to effectively analyze and detect malicious web pages and introduces novel features to capture fine-grained snapshot of maliciousweb pages.
Knowing your enemy: understanding and detecting malicious web advertising
A large-scale study through analyzing ad-related Web traces crawled over a three-month period reveals the rampancy of malvertising: hundreds of top ranking Web sites fell victims and leading ad networks such as DoubleClick were infiltrated.
Honeyware: A Web-Based Low Interaction Client Honeypot
  • Yaser AloseferO. Rana
  • Computer Science
    2010 Third International Conference on Software Testing, Verification, and Validation Workshops
  • 2010
This paper will present the idea of using web-based technology and integrating it with a client honeypot by building a low interaction client honey Pot tool called Honeyware, and describes the benefits of Honeyware as well as the challenges of the low interaction Client honeypot and some ideas for how these challenges could be overcome.
Systematic literature review and taxonomy for DDoS attack detection and prediction
A comprehensive systematic literature review and measurement analysis of the DDoS impact and an in-depth analysis the advantages and the drawbacks of existing DDoS detection and prediction technique to assist for both academia and industry researchers towards produce better DDoS Detection and prediction mechanism.
Mitigating Drive-By Download Attacks: Challenges and Open Problems
A series of techniques that can be implemented in web browsers to protect the user from drive-by download attacks that already employ encryption to evade network level detection are proposed.
HoneyC - The low-interaction client honeypot
Performance measurements of a prototype implementation targeting clients using the HTTP 1.1 protocol indicate that low-interaction client honeypots are faster and cheaper than high-inter interaction client Honeypot technologies.
Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack
A machine learning based Distributed Denial of Service (DDoS) attack detection system, implemented in a virtual SDN environment testbed, showed up to 93% detection accuracy with a low false-positive rate.
A survey of blockchain from security perspective
This survey examines the security issues of blockchain model related technologies and their applications based on a survey from recent research papers and shows which way blockchain development trends are going.
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
The effectiveness of NOZZLE is measured by demonstrating that it successfully detects 12 published and 2,000 synthetically generated heap-spraying exploits and it is shown that even with a detection threshold set six times lower than is required to detect published malicious attacks, NOZZle reports no false positives when run over 150 popular Internet sites.
The Morris Worm: A Fifteen-Year Perspective
  • H. Orman
  • Computer Science
    IEEE Secur. Priv.
  • 2003
The Morris worm was the first worm to hit the Internet and caused a disruption never seen before. In the 15 years since its appearance, have we learned our lessons ab out computer security?.