메뉴 건너뛰기




Volumn , Issue , 2011, Pages 467-476

SURF: Detecting and measuring search poisoning

Author keywords

Detection; Malicious search engine redirection; Measurement; Search engine poisoning

Indexed keywords

DATA SETS; DETECTION RATES; DETECTION SYSTEM; FALSE POSITIVE RATES; LONG-TERM MEASUREMENTS; MALICIOUS SEARCH ENGINE REDIRECTION; POISONING CASE; POISONING PROBLEM; SEARCH ENGINE OPTIMIZATIONS; SEARCH KEYWORD; SEARCH RESULTS;

EID: 80755169472     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046762     Document Type: Conference Paper
Times cited : (79)

References (25)
  • 1
    • 80755173918 scopus 로고    scopus 로고
    • Google search engine optimization. http://www.google.com/webmasters/.
  • 2
    • 80755172992 scopus 로고    scopus 로고
    • Google trends. http://www.google.com/trends.
    • Trends
  • 4
    • 84871958563 scopus 로고    scopus 로고
    • WOT: Web of trust. http://www.mywot.com/wiki/API.
    • Web of Trust
  • 10
    • 80755173003 scopus 로고    scopus 로고
    • February
    • The dirty little secrets of search. http://www.nytimes.com/2011/02/13/ business/13search.html, February 2011.
    • (2011) The Dirty Little Secrets of Search
  • 14
    • 80755159968 scopus 로고    scopus 로고
    • Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
    • F. Howard and O. Komili. Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware. Technical report, SophosLab, 2010.
    • (2010) Technical Report, SophosLab
    • Howard, F.1    Komili, O.2
  • 22
    • 40949104348 scopus 로고    scopus 로고
    • Tracking web spam with html style similarities
    • March
    • T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking web spam with html style similarities. ACM Trans. Web, 2:3:1-3:28, March 2008.
    • (2008) ACM Trans. Web , vol.2 , pp. 31-328
    • Urvoy, T.1    Chauveau, E.2    Filoche, P.3    Lavergne, T.4
  • 23
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the NDSS, 2006.
    • (2006) Proceedings of the NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.