메뉴 건너뛰기




Volumn 5628 LNCS, Issue , 2009, Pages 256-272

Evil searching: Compromise and recompromise of internet hosts for phishing

Author keywords

[No Author keywords available]

Indexed keywords

EMPIRICAL EVIDENCE; INTERNET HOSTS; MALWARES; PHISHING; ROOT CAUSE; SEARCH TERMS; TECHNIQUES USED; WEB SEARCHES; WEB SERVERS;

EID: 70350398962     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03549-4_16     Document Type: Conference Paper
Times cited : (42)

References (28)
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R., Moore, T.: The economics of information security. Science 314 (5799), 610-613 (2006)
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 7
    • 70350354421 scopus 로고    scopus 로고
    • Identifiable fingerprints in network applications
    • Damron, J.: Identifiable fingerprints in network applications. USENIX; login 28(6), 16-20 (2003)
    • (2003) USENIX; login , vol.28 , Issue.6 , pp. 16-20
    • Damron, J.1
  • 8
    • 70350401488 scopus 로고    scopus 로고
    • Dausin, M.: PHP File Include Attacks. Tipping Point (February 2008), http://dvlabs.tippingpoint.com/blog/2008/02
    • Dausin, M.: PHP File Include Attacks. Tipping Point (February 2008), http://dvlabs.tippingpoint.com/blog/2008/02
  • 13
    • 70350384945 scopus 로고    scopus 로고
    • Phishers Enlist Google 'Dorks'
    • March
    • Higgins, K.J.: Phishers Enlist Google 'Dorks'. DarkReading (March 2008), http://www.darkreading.com/document.asp?doc-id=149324
    • (2008) DarkReading
    • Higgins, K.J.1
  • 14
    • 70350354422 scopus 로고    scopus 로고
    • Personal communication, March 28
    • LaCour, J.: Personal communication, March 28 (2008)
    • (2008)
    • LaCour, J.1
  • 18
    • 70350690706 scopus 로고    scopus 로고
    • McAfee Inc
    • McAfee Inc. SiteAdvisor, http://www.siteadvisor.com
    • SiteAdvisor
  • 20
    • 70350358836 scopus 로고    scopus 로고
    • Netcraft Inc. March 2008 Web Server Survey (2008), http://news.netcraft. com/archives/web-server-survey.html
    • Netcraft Inc. March 2008 Web Server Survey (2008), http://news.netcraft. com/archives/web-server-survey.html
  • 21
    • 70350363819 scopus 로고    scopus 로고
    • PhishTank, http://www.phishtank.com/
    • PhishTank
  • 23
    • 54249112525 scopus 로고    scopus 로고
    • Stop Badware, http://www.stopbadware.org/
    • Stop Badware
  • 24
    • 51349104113 scopus 로고    scopus 로고
    • The Webalizer, http://www.mrunix.net/webalizer/
    • The Webalizer
  • 25
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • Thomas, R., Martin, J.: The underground economy: priceless. USENIX; login 31(6), 7-16 (2006)
    • (2006) USENIX; login , vol.31 , Issue.6 , pp. 7-16
    • Thomas, R.1    Martin, J.2
  • 26
    • 39749170972 scopus 로고    scopus 로고
    • The Honeynet Project & Research Alliance May 2005
    • Watson, D., Holz, T., Mueller, S.: Know your Enemy: Phishing. The Honeynet Project & Research Alliance (May 2005), http://www.honeynet.org/ papers/phishing/
    • Know your Enemy: Phishing
    • Watson, D.1    Holz, T.2    Mueller, S.3
  • 27
    • 77953910522 scopus 로고    scopus 로고
    • Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
    • ACM Press, New York
    • Weaver, R., Collins, M.P.: Fishing for phishes: applying capture-recapture methods to estimate phishing populations. In: Anti-Phishing Working Group eCrime Researcher's Summit (APWG eCrime), pp. 14-25. ACM Press, New York (2007)
    • (2007) Anti-Phishing Working Group eCrime Researcher's Summit (APWG eCrime) , pp. 14-25
    • Weaver, R.1    Collins, M.P.2
  • 28
    • 70350360750 scopus 로고    scopus 로고
    • Yahoo! Inc. Yahoo! Search Web Services, http://developer.yahoo.com/ search/
    • Yahoo! Inc. Yahoo! Search Web Services, http://developer.yahoo.com/ search/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.