메뉴 건너뛰기




Volumn 14, Issue 6, 2012, Pages 324-338

Harvesting SSL certificate data to identify web-fraud

Author keywords

Certificates; Phishing; SSL; Typosquatting

Indexed keywords

CERTIFICATES; COMPREHENSIVE STUDIES; NOVEL TECHNIQUES; PHISHING; SSL; TYPOSQUATTING;

EID: 84872870918     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (52)
  • 1
    • 84872876337 scopus 로고    scopus 로고
    • Alexa.com
    • Alexa.com. "Alexa ranking methodology". http: //www.alexa.com/help/traffic_learn_more/
    • Alexa ranking methodology
  • 5
    • 34548344520 scopus 로고    scopus 로고
    • Anti Phishing Working Group
    • Anti Phishing Working Group, Phishing Activity Trends Report - April 2007. http://www.antiphishing.org/reports/apwg_ report_april_2007.pdf
    • Phishing Activity Trends Report -April 2007
  • 7
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 8
    • 0035478854 scopus 로고    scopus 로고
    • Random Forests
    • L. Breiman, "Random Forests," Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 9
    • 84872874639 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and CRL Profile, (IETF RFC5280)
    • D. Cooper and et al, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, (IETF RFC5280). http://www.ietf.org/rfc/rfc5280. txt
    • Cooper, D.1
  • 11
    • 75749120777 scopus 로고    scopus 로고
    • McAUnintended adventures in browsing
    • B. Edelman, "McAUnintended adventures in browsing," Mcafee Security Journal, 2008. http: //www.mcafee.com/us/local_content/misc/threat_center/msj_unintended_adve ntures_ browsing.pdf
    • (2008) Mcafee Security Journal
    • Edelman, B.1
  • 13
    • 84872839988 scopus 로고    scopus 로고
    • Electronic Frontier Foundation
    • Electronic Frontier Foundation, HTTPS Everywhere, 2010. https://www.eff.org/https-everywhere
    • (2010) HTTPS Everywhere
  • 14
    • 84872867570 scopus 로고    scopus 로고
    • F-Secure, Googkle.com Installed Malware by Exploiting Browser Vulnerabilities
    • F-Secure, Googkle.com Installed Malware by Exploiting Browser Vulnerabilities, 2009. http://www. f-secure.com/v-descs/googkle.shtml
    • (2009)
  • 16
    • 84983110889 scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting," in European Conference on Computational Learning Theory, pp. 23-37, 1995.
    • (1995) European Conference on Computational Learning Theory , pp. 23-37
    • Freund, Y.1    Schapire, R.E.2
  • 17
    • 84872868749 scopus 로고    scopus 로고
    • Google.com, Parked Domain Site
    • Google.com, Parked Domain Site. http: //adwords.google.com/support/aw/bin/answer. py?hl=en&answer=50002.
  • 18
    • 84872871046 scopus 로고    scopus 로고
    • Google.com, The Google Spell Checker
    • Google.com, The Google Spell Checker. http://www. google.co.uk/help/features.html.
  • 19
    • 42149186965 scopus 로고    scopus 로고
    • Cryptographic strength of SSL/TLS servers: Current and recent practices
    • H. Lee and T. Malkin and E. Nahum, "Cryptographic strength of SSL/TLS servers: Current and recent practices," in Internet Measurement Comference, pp. 83-92, 2007.
    • (2007) Internet Measurement Comference , pp. 83-92
    • Lee, H.1    Malkin, T.2    Nahum, E.3
  • 23
    • 70350630557 scopus 로고    scopus 로고
    • Beyond blacklists: learning to detect malicious web sites from suspicious URLs
    • J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," in KDD 2009, pp. 1245-1254, 2009.
    • (2009) KDD 2009 , pp. 1245-1254
    • Ma, J.1    Saul, L.K.2    Savage, S.3    Voelker, G.M.4
  • 24
    • 84870265063 scopus 로고    scopus 로고
    • Phishing secrets: History, effects, and countermeasures
    • A. S. Martino and X. Perramon, "Phishing secrets: History, effects, and countermeasures," International Journal of Network Security, vol. 11, no. 3, pp. 163-171, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.3 , pp. 163-171
    • Martino, A.S.1    Perramon, X.2
  • 25
    • 84872836128 scopus 로고    scopus 로고
    • McAfee, McAfee SiteAdvisor
    • McAfee, McAfee SiteAdvisor. http://www.siteadvisor.com/.
  • 30
    • 84872831690 scopus 로고    scopus 로고
    • Netcraft, Netcraft SSL Survey
    • Netcraft, Netcraft SSL Survey, 2008. http://news. netcraft.com/SSL-Survey
    • (2008)
  • 31
    • 84872838143 scopus 로고    scopus 로고
    • OpenSSL, The OpenSSL Project
    • OpenSSL, The OpenSSL Project, 2007. http://www. openssl.org/.
    • (2007)
  • 33
    • 84872853774 scopus 로고    scopus 로고
    • Phishtank.com
    • Phishtank.com. http://www.phishtank.com
  • 36
    • 84872859486 scopus 로고    scopus 로고
    • Phishing Toolkit Attacks are Abusing SSL Certificates
    • Z. Raza, Phishing Toolkit Attacks are Abusing SSL Certificates, 2009. http: //www.symantec.com/connect/blogs/phishing-toolkit-attacks-are-abusing-ss l-certificates
    • (2009)
    • Raza, Z.1
  • 41
    • 84872843211 scopus 로고    scopus 로고
    • Serial Typo-squatters Target Security Firms, Sep
    • W. Sturgeon, Serial Typo-squatters Target Security Firms, Sep. 2005. http://news.zdnet.com/2100-1009_22-5873001.html
    • (2005)
    • Sturgeon, W.1
  • 43
    • 84872866358 scopus 로고    scopus 로고
    • Generalized anomaly detection model for windowsbased malicious program behavior
    • Nov
    • X. Tang, C. N. Manikopoulos, and S. G. Ziavras, "Generalized anomaly detection model for windowsbased malicious program behavior," International Journal of Network Security, vol. 7, no. 3, pp. 428-435, Nov. 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 428-435
    • Tang, X.1    Manikopoulos, C.N.2    Ziavras, S.G.3
  • 44
    • 84872848267 scopus 로고    scopus 로고
    • VeriSign
    • VeriSign. http://www.verisign.com/.
  • 46
    • 84872831096 scopus 로고    scopus 로고
    • HTTP is Hazardous to Your Health
    • N. Weaver, HTTP is Hazardous to Your Health, 2008. http://nweaver.blogspot.com/2008/05/http-is-hazardous-to-your-health.htm l
    • (2008)
    • Weaver, N.1
  • 47
    • 84872851804 scopus 로고    scopus 로고
    • Http: Must die!
    • L. Weinstein, Http: Must die!. http://lauren. vortex.com/archive/000338.html
    • Weinstein, L.1
  • 48
    • 32244434492 scopus 로고    scopus 로고
    • Gathering evidence: use of visual security cues in web browsers
    • T. Whalen and K. M. Inkpen, "Gathering evidence: use of visual security cues in web browsers," in Proceedings of Graphics Interface 2005, pp. 137-144, 2005.
    • (2005) Proceedings of Graphics Interface , vol.2005 , pp. 137-144
    • Whalen, T.1    Inkpen, K.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.