메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Identifying vulnerable websites by analysis of common strings in phishing URLs

Author keywords

Exploits; Phishing; Remote file inclusion; Vulnerabilities

Indexed keywords

ATTACK METHODS; CASE STUDY APPROACH; INTRUSION DETECTION SYSTEMS; LONGEST COMMON SUBSTRING; PHISHING; REMOTE FILES; WEB SERVERS; WEBMASTERS;

EID: 72449205441     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECRIME.2009.5342610     Document Type: Conference Paper
Times cited : (21)

References (29)
  • 1
    • 72449203008 scopus 로고    scopus 로고
    • Aaron, G., & Rasmussen, R. (2008). Global Phishing Survey: Trends and Domain Name Use 2H2008. Lexington, MA: APWG.
    • Aaron, G., & Rasmussen, R. (2008). Global Phishing Survey: Trends and Domain Name Use 2H2008. Lexington, MA: APWG.
  • 2
    • 72449167296 scopus 로고    scopus 로고
    • A Comparison of Machine Learning Techniques for Phishing Detection
    • Pittsburgh, PA
    • Abu-Nimeh, S., Nappa, D., Wang, X., & Nair, S. (2007). A Comparison of Machine Learning Techniques for Phishing Detection. APWG eCrimes Researchers Summit, (pp. 60-69). Pittsburgh, PA.
    • (2007) APWG eCrimes Researchers Summit , pp. 60-69
    • Abu-Nimeh, S.1    Nappa, D.2    Wang, X.3    Nair, S.4
  • 5
    • 72449155427 scopus 로고    scopus 로고
    • Commission, F. T. (2008). Deter. Detect. Defend. Avoid ID Theft. Retrieved from Fighting Back Against Identity Theft: http://www.ftc.gov/bcp/edu/ microsites/idtheft/index.html
    • Commission, F. T. (2008). Deter. Detect. Defend. Avoid ID Theft. Retrieved from Fighting Back Against Identity Theft: http://www.ftc.gov/bcp/edu/ microsites/idtheft/index.html
  • 6
    • 72449125013 scopus 로고    scopus 로고
    • Commission, F. T. (2008). Phishing - OnGuard Online. Retrieved from OnGuard Online: www.onguardonline.gov/topics/phishing.aspx
    • Commission, F. T. (2008). Phishing - OnGuard Online. Retrieved from OnGuard Online: www.onguardonline.gov/topics/phishing.aspx
  • 7
    • 72449206466 scopus 로고    scopus 로고
    • 2.2 Arbitrary File Upload Exploit. Retrieved from
    • Concha, A. (2007). WordPress 2.2 Arbitrary File Upload Exploit. Retrieved from http://www.milw0rm.org/exploits/4113
    • (2007) WordPress
    • Concha, A.1
  • 8
    • 72449208378 scopus 로고    scopus 로고
    • Corporation, I. T. Regions Identity Theft Kit. Retrieved 2009, from Regions: www.regions.com/virtualDocuments/Identity-Theft-Kit.pdf
    • Corporation, I. T. Regions Identity Theft Kit. Retrieved 2009, from Regions: www.regions.com/virtualDocuments/Identity-Theft-Kit.pdf
  • 10
    • 72449180715 scopus 로고    scopus 로고
    • eBay. Spoof Email Tutorial. Retrieved 2009, from eBay: pages.ebay.com/education/spooftutorial/
    • eBay. Spoof Email Tutorial. Retrieved 2009, from eBay: pages.ebay.com/education/spooftutorial/
  • 13
    • 72449168267 scopus 로고    scopus 로고
    • Retrieved 2009, from
    • Google. Google Safe Browsing for Firefox. Retrieved 2009, from http://www.google.com/tools/firefox/safebrowsing/
    • Google Safe Browsing for Firefox
  • 16
    • 72449212095 scopus 로고    scopus 로고
    • Retrieved 2009, from
    • He, Y. LCS - yiminghe - JavaEye. Retrieved 2009, from http://yiminghe.javaeye.com/blog/257678
    • LCS - yiminghe - JavaEye
    • He, Y.1
  • 19
    • 72449131745 scopus 로고    scopus 로고
    • Retrieved 2009, from
    • Microsoft. Anti-Phishing Home. Retrieved 2009, from http://www.microsoft. com/mscorp/safety/technologies/antiphishing/default.mspx
    • Microsoft. Anti-Phishing Home
  • 23
    • 72449196087 scopus 로고    scopus 로고
    • Retrieved 2009, from
    • Symantec. Antiphishing Protection. Retrieved 2009, from http://www.symantec.com/norton/security-response/phishing.jsp
    • Antiphishing Protection
  • 24
    • 72449129844 scopus 로고    scopus 로고
    • Vind, J. [waraxe-2009-SA#071] - Multiple Vulnerabilities in VirtueMart 1.1.2. Retrieved 2009, from http://www.waraxe.us/advisory-71.html
    • Vind, J. [waraxe-2009-SA#071] - Multiple Vulnerabilities in VirtueMart 1.1.2. Retrieved 2009, from http://www.waraxe.us/advisory-71.html
  • 25
    • 72449182529 scopus 로고    scopus 로고
    • Vind, J. VirtueMart <= 1.1.2 Multiple Remote Vulnerabilities. Retrieved 2009, from http://www.milw0rm.com/exploits/8327
    • Vind, J. VirtueMart <= 1.1.2 Multiple Remote Vulnerabilities. Retrieved 2009, from http://www.milw0rm.com/exploits/8327
  • 28
    • 72449177235 scopus 로고    scopus 로고
    • Z3ro, C. (2007). Joomla Component Expose <=RC35 Remote File Upload Vulnerability. Retrieved from http://www.milw0rm.com/exploits/4194
    • Z3ro, C. (2007). Joomla Component Expose <=RC35 Remote File Upload Vulnerability. Retrieved from http://www.milw0rm.com/exploits/4194
  • 29
    • 35348905575 scopus 로고    scopus 로고
    • CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
    • Banff, Alberta, Canada: ACM Press
    • Zhang, Y., Hong, J., & Cranor, L. (2007). CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. WWW '07: The 16th International Conference on World Wide Web (pp. 639-648). Banff, Alberta, Canada: ACM Press.
    • (2007) WWW '07: The 16th International Conference on World Wide Web , pp. 639-648
    • Zhang, Y.1    Hong, J.2    Cranor, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.