Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of DOM Elements.
Andrea BernardiniPublished in: ITASEC (2018)
Keyphrases
- monitoring system
- real time
- application domains
- hash functions
- website
- data structure
- network traffic
- cross domain
- relational databases
- web pages
- genetic algorithm
- real world
- binary codes
- signature recognition
- malicious users
- malicious traffic
- xml documents
- xml data
- decision support
- high dimensional
- decision trees
- information systems
- neural network