Paper Abstract and Keywords |
Presentation |
2014-11-28 11:10
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.
Most Web users usually click the URL without being aware of its underlying dangerousness.
so they received Material or financial damage due to Web-based attacks.
URL Blacklist is one of effective approach for preventing Web-based attacks from occurring.
However,Blacklist’s update cannot catch up with the appearance of new malicious URL.
Under this situation, the main objective of this research is to extend URL Blacklist with variety of new malicious URL as quickly as possible.
We propose Magnet system that can gather new URL that is similar to few existing malicious ones considered as query based on static feature.
In this paper, we describe the detail of Magnet system and experiment conclusion. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Drive-by-download / phishing scam / malicious URL / URL Blacklist / Bayesian Sets / Web crawler / / |
Reference Info. |
IEICE Tech. Rep., vol. 114, no. 340, ICSS2014-61, pp. 61-66, Nov. 2014. |
Paper # |
ICSS2014-61 |
Date of Issue |
2014-11-20 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2014-61 |
Conference Information |
Committee |
ICSS |
Conference Date |
2014-11-27 - 2014-11-28 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Tohoku Gakuin University (Tagajo Campus) |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Control System Security, Informatin and Communication System Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2014-11-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
searching malicious URL from vast webspace |
Sub Title (in English) |
|
Keyword(1) |
Drive-by-download |
Keyword(2) |
phishing scam |
Keyword(3) |
malicious URL |
Keyword(4) |
URL Blacklist |
Keyword(5) |
Bayesian Sets |
Keyword(6) |
Web crawler |
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Bo Sun |
1st Author's Affiliation |
Waseda University (Waseda Univ.) |
2nd Author's Name |
Mitsuaki Akiyama |
2nd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
3rd Author's Name |
Takeshi Yagi |
3rd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
4th Author's Name |
Tatsuya Mori |
4th Author's Affiliation |
Waseda University (Waseda Univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2014-11-28 11:10:00 |
Presentation Time |
25 minutes |
Registration for |
ICSS |
Paper # |
ICSS2014-61 |
Volume (vol) |
vol.114 |
Number (no) |
no.340 |
Page |
pp.61-66 |
#Pages |
6 |
Date of Issue |
2014-11-20 (ICSS) |
|