LSTM RNN: detecting exploit kits using redirection chain sequences
Open Access
- 12 July 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Cybersecurity
- Vol. 4 (1), 1-15
- https://doi.org/10.1186/s42400-021-00093-7
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- REdiREKT: Extracting Malicious Redirections from Exploit Kit TrafficPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2020
- An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet LevelApplied Sciences, 2019
- You Could Be Mine(d): The Rise of CryptojackingIEEE Security & Privacy, 2019
- Research on Malicious JavaScript Detection Technology Based on LSTMIEEE Access, 2018
- Classification of Exploit-Kit behaviors via machine learning approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- Anomaly-Based Web Attack DetectionPublished by Association for Computing Machinery (ACM) ,2017
- An Approach to Detect Drive-By Download by Observing the Web Page Transition BehaviorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script InjectionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Detecting malicious HTTP redirections using trees of user browsing activityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Anatomy of Exploit KitsLecture Notes in Computer Science, 2013