X-Secure: protecting users from big bad wolves

Robbie Binnie, Colin McLean, Amar Seeam, Xavier Bellekens

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
    104 Downloads (Pure)

    Abstract

    In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious scripts are executed by the host computer. X-Secure was able to detect over 90% of the tested attacks and provides a danger level based on cumulative analysis of the source code, the URL, and the remote server, by using a set of heuristics, hence increasing the situational awareness of users browsing the internet.
    Original languageEnglish
    Title of host publication2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech)
    PublisherIEEE
    Pages158-161
    Number of pages4
    ISBN (Print)9781509007066, 9781509007073
    DOIs
    Publication statusPublished - 10 Nov 2016
    Event2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies - Balaclava, Mauritius
    Duration: 3 Aug 20166 Aug 2016
    https://web.archive.org/web/20160921225829/http://www.emergitech2016.org:80/

    Conference

    Conference2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies
    Abbreviated titleEmergiTech 2016
    CountryMauritius
    CityBalaclava
    Period3/08/166/08/16
    Internet address

    Fingerprint Dive into the research topics of 'X-Secure: protecting users from big bad wolves'. Together they form a unique fingerprint.

    Cite this