作者
Amir Javed, Pete Burnap, Omer Rana
发表日期
2019/5/1
期刊
Information Processing & Management
卷号
56
期号
3
页码范围
1133-1145
出版商
Pergamon
简介
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cybercriminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated, the cybercriminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a drive-by download. In a drive-by download a user's computer system is infected while interacting with the malicious endpoint, often without them being made aware the attack has taken place. An attacker can gain control of the system by exploiting unpatched system vulnerabilities and this form of attack currently represents one of the most common methods employed. In this paper we build a machine learning model using machine activity data and tweet metadata to move beyond post …
引用总数
201820192020202120222023202426139371
学术搜索中的文章
A Javed, P Burnap, O Rana - Information Processing & Management, 2019