메뉴 건너뛰기




Volumn , Issue , 2008, Pages 91-96

Identification of malicious web pages with static heuristics

Author keywords

Client honeypots; Drive by downloads; Intrusion detection; Security

Indexed keywords

CLASSIFICATION METHODS; CLIENT HONEYPOTS; PERFORMANCE IMPROVEMENTS; REMOTE RESOURCES; SECURITY; SECURITY DEVICES; WEB PAGES;

EID: 64349114005     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ATNAC.2008.4783302     Document Type: Conference Paper
Times cited : (85)

References (24)
  • 1
    • 64349088365 scopus 로고    scopus 로고
    • p. available from, accessed on 2 Janurary 2007
    • K. Wang, "Honeyclient," vol. 2007, no. 1/2/2007, 2005, p. available from http://www.honeyclient.org/trac; accessed on 2 Janurary 2007.
    • (2005) Honeyclient , vol.2007 , Issue.1-2
    • Wang, K.1
  • 4
    • 34447529849 scopus 로고    scopus 로고
    • pp. available from, accessed on 22 September 2007
    • C. Seifert and R. Steenson, "Capture - honeypot client," 2006, pp. available from https://www.client--honeynet.org/capture.html; accessed on 22 September 2007.
    • (2006) Capture - honeypot client
    • Seifert, C.1    Steenson, R.2
  • 6
    • 58149093741 scopus 로고    scopus 로고
    • Netscape Communications Corporation, p. available from, accessed on 13 October 2007
    • Netscape Communications Corporation, "DMOZ open directory project," 1998, p. available from http://www.dmoz.org; accessed on 13 October 2007.
    • DMOZ open directory project , pp. 1998
  • 7
    • 64349098756 scopus 로고
    • p. available from, accessed on 20 November 2007
    • D. Filo and J. Wang, "Yahoo! search engine," 1994, p. available from http://www.yahoo.com/; accessed on 20 November 2007.
    • (1994)
    • Filo, D.1    Wang, J.2
  • 9
    • 64349084540 scopus 로고    scopus 로고
    • p. available from, accessed on 13 September 2008
    • HauteSecure, "Home page," 2006, p. available from http://www.hautesecure.com; accessed on 13 September 2008.
    • Home , pp. 2006
  • 10
    • 56749179139 scopus 로고    scopus 로고
    • Application of divide-andconquer algorithm paradigm to improve the detection speed of high interaction client honeypots
    • Ceara: ACM
    • C. Seifert, P. Komisarczuk, and I. Welch, "Application of divide-andconquer algorithm paradigm to improve the detection speed of high interaction client honeypots," in 23rd Annual ACM Symposium on Applied Computing. Ceara: ACM, 2008.
    • (2008) 23rd Annual ACM Symposium on Applied Computing
    • Seifert, C.1    Komisarczuk, P.2    Welch, I.3
  • 11
    • 64349086260 scopus 로고    scopus 로고
    • C. Seifert, Improving detection accuracy and speed with hybrid client honeypots, phd proposal, 2007. Victoria University of Wellington, 2007, pp. available from http://www.mcs.vuw.ac.nz/~cseifert/ publications/Cseifert phd proposal--Hybrid Client Honeypots.pdf; accessed on 22 March 2007.
    • C. Seifert, "Improving detection accuracy and speed with hybrid client honeypots, phd proposal," vol. 2007. Victoria University of Wellington, 2007, pp. available from http://www.mcs.vuw.ac.nz/~cseifert/ publications/Cseifert phd proposal--Hybrid Client Honeypots.pdf; accessed on 22 March 2007.
  • 12
    • 84880116758 scopus 로고    scopus 로고
    • Honeyc - the low-interaction client honeypot
    • Hamilton
    • C. Seifert, I. Welch, and P. Komisarczuk, "Honeyc - the low-interaction client honeypot," in NZCSRCS, Hamilton, 2007.
    • (2007) NZCSRCS
    • Seifert, C.1    Welch, I.2    Komisarczuk, P.3
  • 14
    • 58149103419 scopus 로고    scopus 로고
    • Caffeine monkey: Automated collection, detection and analysis of malicious javascript
    • Las Vegas
    • B. Feinstein and D. Peck, "Caffeine monkey: Automated collection, detection and analysis of malicious javascript," in Black Hat USA 2007, Las Vegas, 2007.
    • (2007) Black Hat USA 2007
    • Feinstein, B.1    Peck, D.2
  • 16
    • 64349108593 scopus 로고    scopus 로고
    • N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, All your iframes point to us. Google Inc., 2008, pp. available from http://googleonlinesecurity.blogspot.com/2008/02/ all-your-iframe-are-point-to- us.html; accessed on 15 Feburary 2008.
    • N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All your iframes point to us." Google Inc., 2008, pp. available from http://googleonlinesecurity.blogspot.com/2008/02/ all-your-iframe-are-point-to- us.html; accessed on 15 Feburary 2008.
  • 22
    • 64349116334 scopus 로고    scopus 로고
    • A pointillist approach for comparing honeypots
    • Vienna
    • F. Pouget and T. Holz, "A pointillist approach for comparing honeypots," in DIMVA, Vienna, 2005.
    • (2005) DIMVA
    • Pouget, F.1    Holz, T.2
  • 23
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • Singapore: ACM Press
    • S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in 6th ACM Conference on Computer and Communications Security. Singapore: ACM Press, 1999.
    • (1999) 6th ACM Conference on Computer and Communications Security
    • Axelsson, S.1
  • 24
    • 64349102183 scopus 로고    scopus 로고
    • Microsoft Cooperation, Microsoft security bulletin ms06-055: Vulnerability in vector markup language could allow remote code execution, 2006, pp. available from http://www.microsoft.com/technet/security/Bulletin/ MS06--055.mspx; accessed on 14 February 2007.
    • Microsoft Cooperation, "Microsoft security bulletin ms06-055: Vulnerability in vector markup language could allow remote code execution," 2006, pp. available from http://www.microsoft.com/technet/security/Bulletin/ MS06--055.mspx; accessed on 14 February 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.