Detection of Online Malicious Behavior: An Overview

  • D. S. DeshpandeEmail author
  • S. P. Deshpande
  • V. M. Thakare
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Online malicious behavior is performed in a certain kind of pressure, availability of opportunity, and through rationalized way. Web systems are accessed through browser and integrated with database so they usually face many types of vulnerabilities and online threats. The survey is focused on categorization of online malicious behavior on certain web platforms such as education, information technology, finance, and government. The characteristics of malicious behavior are explained. The research purpose is to gather, observe, compare, and study different malicious behavior, detection systems, tools and technologies used, results, and their drawbacks. The numerical observations of malicious behavior are given in order to understand severity of this behavior and its impact. The systems are observed comparatively to point out the challenges. The possible suggestions are mentioned about current requirements in online malicious behavior detection systems. The mind condition behind all malicious behavior is dishonesty and it is contagious by nature. The hybrid detection model is required which will detect malicious behavior in real time, will be flexible enough to configure newly arrived malicious behavior with good accuracy, and will work on multiple domains.


Malicious behavior Suspicious behavior Fraud detection Intrusion detection model Online banking Attacks Web security Online vulnerabilities Online threats 


  1. 1.
    Nilakshi, J., Shwetambari, P., Dhananjay K.: Network security analyzer: detection and prevention of web attacks. Springer International Publishing Switzerland. In: Satapathy, S.C., Das, S. (eds.) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems, vol. 1. Smart Innovation, Systems and Technologies, vol. 50, pp. 497–505 (2016)Google Scholar
  2. 2.
    Srijan, K.: Characterization and Detection of Malicious Behavior on the Web. Ph.D. Thesis, pp. 1–225 (2017)Google Scholar
  3. 3.
    Maeve, D.: Online Harassment. Pew Research Center, pp. 1–65 (2014)Google Scholar
  4. 4.
    Maeve, D.: Online Harassment. Pew Research Center (2017)Google Scholar
  5. 5.
    FBI Internet Crime Complaint Center (IC3) annual reports. (2017)
  6. 6.
    Cheng, J., Bernstein, M., Danescu-Niculescu-Mizil, C., Leskovec, J.: Anyone can become a troll: causes of trolling behavior in online discussions. In: Proceedings of the 20th ACM Conference on Computer-Supported Cooperative Work & Social Computing (2017)Google Scholar
  7. 7.
    Mazar, N., Amir, O., Ariely, D.: The dishonesty of honest people: a theory of self-concept maintenance. J. Mark. Res. 1–48 (2008)Google Scholar
  8. 8.
    Katerina, G., Goce, A., Ana, D., Risto, P., Brandon, M.: Characterization and classification of malicious web traffic. Comput. Secur. 42, 92–115 (2014)CrossRefGoogle Scholar
  9. 9.
    Lee, S., Kim, H.: Why people post benevolent and malicious comments online. Commun. ACM 58, 74–79 (2015)CrossRefGoogle Scholar
  10. 10.
    Soojin, Y., Hyun-lock, C., Hanchul, B., Hwankuk, K.: Behavior-based detection for malicious script-based attack. In: Park, J., et al. (eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering, pp. 97–103. Springer Nature Singapore (2017)Google Scholar
  11. 11.
    Poornachandran, P., Balagopal, N., Pal, S., Ashok, A., Sankar, P., Krishnan, M.R.: Demalvertising: a kernel approach for detecting malwares in advertising networks. In: Mandal, J.K., et al. (eds.) Proceedings of the First International Conference on Intelligent Computing and Communication, Advances in Intelligent Systems and Computing, vol. 458, pp. 215–224. Springer Science+Business Media Singapore (2017)Google Scholar
  12. 12.
    Amant, R.S., Robert, D.L.: Natural interaction for bot detection. Natural Web Interfaces. IEEE Internet Comput. 20, 69–73 (2016)Google Scholar
  13. 13.
    Maheswari, K.G., Anita, R.: An intelligent detection system for SQL attacks on web IDS in a real-time application. In: Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC—16’), Smart Innovation, Systems and Technologies, vol. 49, pp. 93–99. Springer International Publishing Switzerland (2016)Google Scholar
  14. 14.
    Noam, A., Cleotilde, G.: Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48, 51–61 (2015)CrossRefGoogle Scholar
  15. 15.
    David, Z., Issa, T., Bassam, S., Wei, L., Sherif, S., Ali, G., Dan, G.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013)CrossRefGoogle Scholar
  16. 16.
    Kristof, S., Marius, K., Alexander, B., Rieck, K.: Early detection of malicious behavior in JavaScript code. In: AISec’12, pp. 15–24. ACM (2012)Google Scholar
  17. 17.
    Yinxing, X., Junjie, W., Yang, L., Hao, X., Jun, S., Mahinthan C., Detection and classification of malicious JavaScript via attack behavior modelling. In: ISSTA’15, pp. 48–59. ACM (2015)Google Scholar
  18. 18.
    Inyong, L., Soonki, J., Sangsoo, Y., Jongsub, M.: A novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55, 58–68 (2012)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Web Application Attack Statistics, pp. 1–11, Q1 (2017)Google Scholar
  20. 20.
    Thiyab, R., Ali, M., Basil, F.: The impact of SQLIAs on the security of databases. In: Proceedings of 6th ICOCI, no. 80, pp. 323–331 (2017)Google Scholar
  21. 21.
    Ashish, D., Sanjay, J.: Neutralizing SQL injection attack using server side code modification in web applications. Hindawi, Secur. Commun. Netw. Research Article 1–12 (2017)Google Scholar
  22. 22.
    Victor, P., Kim, C., Helen, A.: Context-oriented web application protection model. Appl. Math. Comput. 285, 59–78 (2016)MathSciNetzbMATHGoogle Scholar
  23. 23.
    Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacksGoogle Scholar
  24. 24.
    Subrahmanian, V.S., Kumar, S.: Predicting human behavior: the next frontiers. Science 355(6324), 489 (2017)CrossRefGoogle Scholar
  25. 25.
    Singh, P., Singh, M.: Fraud detection by monitoring customer behavior and activities. IJCA 111(11), 23–32 (2015)CrossRefGoogle Scholar
  26. 26.
    William, H., Jeremy, V., Alessandro, O.: A classification of SQL injection attacks and countermeasures, pp 1–11. IEEE (2006)Google Scholar
  27. 27.
    Roshni, C., Manoj, M., Santhi, T., Dipankar, S.: SQL injection attack mechanisms and prevention techniques. In: ADCONS, pp. 524–533. Springer, Berlin (2012)Google Scholar
  28. 28.
    Jai, S.: Analysis of SQL injection detection techniques. Theor. Appl. Inform. 28(1 & 2), 37–55 (2016)Google Scholar
  29. 29.
    Atefeh, T., Maslin, M., Mohammad, H., Suhaimi, I.: SQL injection detection and prevention tools assessment, pp. 518–522. IEEE (2010)Google Scholar
  30. 30.
    SQL Injection Attacks: Detection in a Web Application Environment, DB Networks,, pp. 1–13 (2016)
  31. 31.
    Manisha, B., Vanita, M.: Protection of web application against SQL injection attack. Int. J. Sci. Res. Publ. 3(10), 1–5 (2013)Google Scholar
  32. 32.
    Liu, Huan, Morstatter, Fred, Tang, Jiliang, Zafarani, Reza: The good, the bad, and the ugly: uncovering novel research opportunities in social media mining. Int. J. Data Sci. Anal. 1(3–4), 137–143 (2016)CrossRefGoogle Scholar
  33. 33.
    Viswanath, B., et al.: An analysis of social network-based sybil defenses. In: Proceedings of SIGCOMM, pp. 363–374. ACM (2010)Google Scholar
  34. 34.
    Long, J., Yang, C., Tianyi, W., Pan, H., Athanasios, V.: Understanding user behavior in online social networks: a survey. IEEE Commun. Mag. 51, 144–150 (2013)CrossRefGoogle Scholar
  35. 35.
  36. 36.
  37. 37.
  38. 38.
    David, B.: Fraud and Distance Education, Session 60Google Scholar
  39. 39.
    Fraud and Role of Information Technology (2008)Google Scholar
  40. 40.
  41. 41.
    Ever increasing fraud risks in the IT and ITeS sector. Fraud Investigation and Dispute Services, ERNST & young, pp. 1–12Google Scholar
  42. 42.
    da Cunha, J.V.A., Cornachione, E.B.: Frauds and information technology: analysis of the influence on accounting and company systems. In: IFIP Springer Book Series, vol. 105, pp. 179–193 (2003)Google Scholar
  43. 43.
    Fighting Online Fraud: An Industry Perspective, vol. 3, pp. 1–8. ACI Universal PaymentsGoogle Scholar
  44. 44.
    Current fraud trends in the financial sector. ASSOCHAM India, pp. 1–28 (2015)Google Scholar
  45. 45.
    Singh, C., Pattanayak, D., et al.: Frauds in Indian banking industry. IIMB-WP NO. 505, pp. 1–24 (2016)Google Scholar
  46. 46.
    Deloitte, Indian Fraud Survey (2014)Google Scholar
  47. 47.
    “Online Fraud”, National Audit Office, pp. 1–50 (2017)Google Scholar
  48. 48.
    “Online fraud: increased threats in a real-time world”, SAS, pp. 1–4Google Scholar
  49. 49.
  50. 50.
  51. 51.
  52. 52.
    “As fake website scams abound, a government registry for Indian internet domains may be in the works”,, Article, Nov. 2017Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • D. S. Deshpande
    • 1
    Email author
  • S. P. Deshpande
    • 2
  • V. M. Thakare
    • 3
  1. 1.SGBAUAmravatiIndia
  2. 2.Department of Computer Science & TechnologyDCPEAmravatiIndia
  3. 3.Department of Computer Science & TechnologySGBAUAmravatiIndia

Personalised recommendations