A FILTER FOR ANALYSIS AND DETECTION OF MALICIOUS WEB PAGES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 4
Abstract
Internet services are more necessary part of our daily life. We rely growingly on the ease and flexibility of Internet connected devices to shop, communicate and in general perform tasks that would require our physical presence. While very valuable, Internet transactions can represent user sensitive information. Banking sector’s and personal medical records, system authorization passwords and personal communication records can easily become known to an enemy who can easily compromise any of the devices include in online transactions. Regrettably, In this transaction the user’s personal computer seems to be the weakest link. At the same time attacker also use new attacks for identification of user’s sensitive information with vulnerabilities that use a small part of code in web pages. Overcome these problems use a novel approach for a filtering technique to finding malicious web pages very effectively and efficiently using supervised machine learning. Also detailed study some other techniques researcher research to analysis and detection of malicious web pages.
Authors and Affiliations
Prof. SagarRajebhosale*,
OPTIMIZATION OF PARAMETERS FOR REMOVAL OF PHOSPHATE FROM PHARMACEUTICAL EFFLUENT BY CHEMICAL PRECIPITATION USING CaCO3
Phosphate is an important nutrient that occurs widely in the environment. It is the key elements necessary for the growth of plants and animals. It is the eleventh most abundant element on the surface of the earth...
ON Soft GR-Separation Axioms in Soft Topological Spaces
The aim of this paper is to define soft gr-separation axioms and obtain some of their characterizations.
A STUDY ON ELECTRICALLY CONTROLLED SOLID PROPELLANTS
Present Study focuses on the type of solid propellant whose burn process can be controlled electrically. The major disadvantage of solid propellant is once extinguish it can’t be stopped which may lead any mis-hap...
Implementation on Distributed Network Services Using SSO for Secure Mechanism
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user...
Analysis and Simulation of Asymmetrical Current Source Multilevel Inverter
This paper presents asymmetrical current source multilevel inverter approach for high power output applications. The topology used here is derived from the multilevel voltage-source inverter (MVSI) by dual conver...