메뉴 건너뛰기




Volumn , Issue , 2013, Pages 141-152

Cross-layer detection of malicious websites

Author keywords

Cross layer detection; Dynamic analysis; Hybrid analysis; Malicious URL; Static analysis

Indexed keywords

COMPUTATIONAL LIMITATIONS; CROSS-LAYER; DETECTION APPROACH; DETECTION TECHNIQUE; EVALUATION METHODS; HYBRID ANALYSIS; MALICIOUS URL; STATIC AND DYNAMIC;

EID: 84874838079     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2435349.2435366     Document Type: Conference Paper
Times cited : (87)

References (41)
  • 2
    • 84873447654 scopus 로고    scopus 로고
    • Prophilcr: A fast filter for the large-scale detection of malicious web pages
    • ACM
    • D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophilcr: a fast filter for the large-scale detection of malicious web pages. In WWW'11, pages 197-206. ACM, 2011.
    • (2011) WWW'11 , pp. 197-206
    • Canali, D.1    Cova, M.2    Vigna, G.3    Kruegel, C.4
  • 3
    • 79956002283 scopus 로고    scopus 로고
    • WebPatrol: Automated collection and replay of web-bascd malware scenarios
    • K. Z. Chen, G. Gu, J. Nazario, X. Han, and J. Zhuge. WebPatrol: Automated collection and replay of web-bascd malware scenarios. In ASIACCS' 11, pages 186-195, 2011.
    • (2011) ASIACCS' 11 , pp. 186-195
    • Chen, K.Z.1    Gu, G.2    Nazario, J.3    Han, X.4    Zhuge, J.5
  • 4
    • 84874521918 scopus 로고    scopus 로고
    • Detecting malicious web links and identifying their attack types
    • H. Choi, B. B. Zhu, and H. Lee. Detecting malicious web links and identifying their attack types. In WebApps '11, pages 11-11, 2011.
    • (2011) WebApps '11 , pp. 11-11
    • Choi, H.1    Zhu, B.B.2    Lee, H.3
  • 5
    • 34249753618 scopus 로고
    • Support-vector networks
    • C. Cortes and V. Vapnik. Support-vector networks. In Machine Learning, pages 273-297, 1995.
    • (1995) Machine Learning , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 6
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious javascript code
    • M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious javascript code. In WWW'10, pages 281-290, 2010.
    • (2010) WWW'10 , pp. 281-290
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 9
    • 77954717029 scopus 로고    scopus 로고
    • Adsandbox: Sandboxing javascript to fight malicious websites
    • A. Dewald, T. Holz, and F. C. Freiling. Adsandbox: Sandboxing javascript to fight malicious websites. In SAC'10, pages 1859-1864, 2010.
    • (2010) SAC'10 , pp. 1859-1864
    • Dewald, A.1    Holz, T.2    Freiling, F.C.3
  • 10
    • 77954525433 scopus 로고    scopus 로고
    • Caffeine Monkey: Automated collection, detection and analysis of malicious javascript
    • B. Feinstein and D. Peck. Caffeine Monkey: Automated collection, detection and analysis of malicious javascript. In Black Hat '07, 2007.
    • (2007) Black Hat '07
    • Feinstein, B.1    Peck, D.2
  • 11
    • 77952338717 scopus 로고    scopus 로고
    • A framework for detection and measurement of phishing attacks
    • S. Garcra, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In WORM'07, pages 1-8, 2007.
    • (2007) WORM'07 , pp. 1-8
    • Garcra, S.1    Provos, N.2    Chew, M.3    Rubin, A.D.4
  • 23
    • 0000468432 scopus 로고
    • Estimating continuous distributions in bayesian classifiers
    • G. H. John and P. Langley. Estimating continuous distributions in Bayesian classifiers. UAI, pages 338-345, 1995.
    • (1995) UAI , pp. 338-345
    • John, G.H.1    Langley, P.2
  • 24
    • 83755215609 scopus 로고    scopus 로고
    • Escape from monkey island: Evading high-interaction honeyclients
    • A. Kapravelos, M. Cova, C. Kruegel, and G. Vigna. Escape from monkey island: Evading high-interaction honeyclients. In DIMVA'11, 2011.
    • (2011) DIMVA'11
    • Kapravelos, A.1    Cova, M.2    Kruegel, C.3    Vigna, G.4
  • 25
  • 26
    • 70350630557 scopus 로고    scopus 로고
    • Beyond blacklists: Learning to detect malicious web sites from suspicious urls
    • J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond blacklists: Learning to detect malicious web sites from suspicious urls. In KDD'09, pages 1245-1254, 2009.
    • (2009) KDD'09 , pp. 1245-1254
    • Ma, J.1    Saul, L.K.2    Savage, S.3    Voelker, G.M.4
  • 27
    • 84857273448 scopus 로고    scopus 로고
    • IceShicld: Detection and mitigation of malicious websites with a frozen DOM
    • T. F. Mario Heiderich and T. Holz. IceShicld: Detection and mitigation of malicious websites with a frozen DOM. In RAID'11, pages 281-300, 2011.
    • (2011) RAID'11 , pp. 281-300
    • Mario Heiderich, T.F.1    Holz, T.2
  • 28
    • 85084094793 scopus 로고    scopus 로고
    • PhoneyC: A virtual client honeypot
    • J. Nazario. PhoneyC: a virtual client honeypot. In LEET'09, 2009.
    • (2009) LEET'09
    • Nazario, J.1
  • 29
    • 84893520306 scopus 로고    scopus 로고
    • A quantitative study of forum spamming using contcxtbased analysis
    • Y. Niu, Y. min Wang, H. Chen, M. Ma, and F. Hsu. A quantitative study of forum spamming using contcxtbased analysis. In NDSS'07, 2007.
    • (2007) NDSS'07
    • Niu, Y.1    Wang, Y.M.2    Chen, H.3    Ma, M.4    Hsu, F.5
  • 31
    • 0003120218 scopus 로고    scopus 로고
    • Fast training of support vector machines using sequential minimal optimization
    • MIT Press
    • J. C. Piatt. Fast training of support vector machines using sequential minimal optimization. In Advances in Kernel Methods, pages 185-208. MIT Press, 1999.
    • (1999) Advances in Kernel Methods , pp. 185-208
    • Piatt, J.C.1
  • 33
    • 85089726744 scopus 로고    scopus 로고
    • On network-level clusters for spam detection
    • Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In NDSS'10, 2010.
    • (2010) NDSS'10
    • Qian, Z.1    Mao, Z.M.2    Xie, Y.3    Yu, F.4
  • 36
    • 78751553658 scopus 로고    scopus 로고
    • Cujo: Efficient detection and prevention of drive-by-download attacks
    • K. Rieek. T. Krueger, and A. Dewald. Cujo: efficient detection and prevention of drive-by-download attacks. In ACSAC'10, pages 31-39, 2010.
    • (2010) ACSAC'10 , pp. 31-39
    • Rieek, K.1    Krueger, T.2    Dewald, A.3
  • 38
    • 80051985554 scopus 로고    scopus 로고
    • Design and evaluation of a real-tune url spam filtering service
    • K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-tune url spam filtering service. In S&P'Jly 2011.
    • (2011) S&P'Jly
    • Thomas, K.1    Grier, C.2    Ma, J.3    Paxson, V.4    Song, D.5
  • 39
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with stridcr honeymonkcys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with stridcr honeymonkcys: Finding web sites that exploit browser vulnerabilities. In NDSS'06, 2006.
    • (2006) NDSS'06
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4
  • 40
    • 85006397404 scopus 로고    scopus 로고
    • Large-scale automatic classification of plushmg pages
    • C. Whittaker, B. Ryner, and M. Nazif. Large-scale automatic classification of plushmg pages. In NDSS'JO, 2010.
    • (2010) NDSS'JO
    • Whittaker, C.1    Ryner, B.2    Nazif, M.3
  • 41
    • 84869441116 scopus 로고    scopus 로고
    • ARROW: Generating signatures to detect drive-by downloads
    • J. Zhang, C. Seifert, J. W. Stokes, and W. Lee. ARROW: Generating signatures to detect drive-by downloads. In WWW'17, pages 187-196, 2011.
    • (2011) WWW'17 , pp. 187-196
    • Zhang, J.1    Seifert, C.2    Stokes, J.W.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.