메뉴 건너뛰기




Volumn , Issue , 2011, Pages 186-195

WebPatrol: Automated collection and replay of web-based malware scenarios

Author keywords

Drive by download; Malicious script; Web based malware analysis and collection

Indexed keywords

COMPUTATION THEORY; NETWORK SECURITY; WEBSITES;

EID: 79956002283     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966938     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 1
    • 84872102454 scopus 로고    scopus 로고
    • Capture-HPC. https://projects.honeynet.org/capture-hpc.
    • Capture-HPC
  • 17
    • 84911909981 scopus 로고    scopus 로고
    • W3C. XMLHttpRequest. http://www.w3.org/TR/XMLHttpRequest/.
    • XMLHttpRequest
  • 18
    • 79956039308 scopus 로고    scopus 로고
    • Strider HoneyMonkeys: Active Client-Side honeypots for finding web sites that exploit browser vulnerabilities
    • Y. M. Wang. Strider HoneyMonkeys: active Client-Side honeypots for finding web sites that exploit browser vulnerabilities. In Part of Works in Progress at the 14th USENIX Security Symposium, 2007.
    • (2007) Part of Works in Progress at the 14th USENIX Security Symposium
    • Wang, Y.M.1
  • 19
    • 38149135738 scopus 로고    scopus 로고
    • Collecting autonomous spreading malware using high-interaction honeypots
    • J. Zhuge, T. Holz, X. Han, C. Song, and W. Zou. Collecting autonomous spreading malware using high-interaction honeypots. Lecture Notes In Computer Science, vol. 4861:438, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4861 , pp. 438
    • Zhuge, J.1    Holz, T.2    Han, X.3    Song, C.4    Zou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.