Browse > Article

피싱 웹사이트 URL의 수준별 특징 모델링을 위한 컨볼루션 신경망과 게이트 순환신경망의 퓨전 신경망  

Bu, Seok-Jun (연세대학교 컴퓨터과학과)
Kim, Hae-Jung (경일대학교 사이버보안학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. J. Kim, "Image-based malware classification using convolutional neural network," Advances in Computer Science and Ubiquitous Compuging, pp. 1352-1357, 2017.
2 V. Suganya, "A review on phishing attacks and various anti-phishing techniques," Int. Journal of Computer Applications, vol. 139, pp. 20-23, 2016.   DOI
3 K. L. Chiew, K. S. C. Yong and C. Tan, "A survey of phishing attacks: their types, vectors and technical approaches," Expert Systems with Applications, vol. 106, pp. 1-20, 2018.   DOI
4 I. Qabajeh, F. Thabtah and F. Chiclana, "A recent review of conventional vs. automated cybersecurity anti-phishing techniques," Computer Science Review, vol. 29, pp. 44-55, 2018.   DOI
5 J. Y. Kim, S. J. Bu and S. B. Cho, "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders," Information Sciences, vol. 460, pp. 83-102, 2018.   DOI
6 H. J. Kim, "Malware classification using convolutional and recurrent neural network," In Summer Annual Conf. of the Institute of Electronics and Information Engineering, pp. 1329-1331, 2017.
7 P. Prakash, M. Kumar, R. R. Kompella and M. Gupta, "Phishnet: Predictive blacklisting to detect phishing attacks," In Proc. of IEEE Int. Conf. on Computer Communications, pp. 1-5, 2010.
8 J. Ma, L. K. Saul, S. Savage and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," In Proc. of the 15th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 1245-1254, 2009.
9 A. Le, A. Markopoulou and M. Faloutsos, "Phishdef: URL names say it all," In Proc. of IEEE Int. Conf. on Computer Communications, pp. 191-195, 2011.
10 R. Verma and K. Dyer, "On the character of phishing URLs: Accurate and robust statistical learning classifiers," In Proc. of the 5th ACM Conf. on Data and Application Security and Privacy, pp. 111-122, 2015.
11 A. C. Bahnsen, E. C. Bohorquez, S. Villegas, J. Vargas and F. A. Gonzalez, "Classifying phishing URLs using recurrent neural networks," In 2017 APWG Symposium on Electronic Crime Research, pp. 1-8, 2017.
12 J. Zhao, N. Wang, Q. Ma and Z. Cheng, "Classifying malicious URLs using gated recurrent neural networks," In Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 385-394, 2018.
13 A. Anand, K. Gorde, J. R. A. Moniz, N. Park, T. Chakraborty and B. T. Chu, "Phishing URL detection with oversampling based on text generative adversarial networks," In 2018 IEEE Int. Conf. on Big Data, pp. 1168-1177, 2018.
14 W. Yang, W. Zuo and B. Cui, "Detecting malicious URLs via a keyword-based convolutional gated recurrent unit neural network," IEEE Access, 2019.
15 X. Zhang, J. Zhao and Y. LuCun, "Character-level convolutional networks for text classification," In Advances in Neural Information Processing Systems, pp. 649-657, 2015.
16 T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado and J. Dean, "Distributed representations of words and phrases and their compositionality," In Advances in Neural Information Processing Systems, pp. 3111-3119, 2013.
17 OpenDNS, "Phishtank," http://www.phishtank.com.
18 NetScape, "Dmoz open directory project," http://www.dmoz.org.