2009
DOI: 10.1145/1498765.1498782
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrime 2.0

Abstract: Web-based malware attacks are more insidious than ever. What can be done to stem the tide?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(13 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Under the assumption that a phishing website aims to lure the end user to enter their credentials and sensitive information, a limited set of domain expert features can be extracted from URL strings and HTML elements to accurately detect phishing websites. HTML elements such as < ifrmae > or < input > tags accompanied by indicative words such as "password" and "credit card" were previously suggested to be highly effective in detecting phishing websites [36,37]. Additional expert-based features, such as the number of anchors and links, were also investigated [38,39], and when combined with previous work, the authors achieved a true-positive rate (TPR) of 95% for the speci c scenario of phishing website detection.…”
Section: Related Workmentioning
confidence: 99%
“…Under the assumption that a phishing website aims to lure the end user to enter their credentials and sensitive information, a limited set of domain expert features can be extracted from URL strings and HTML elements to accurately detect phishing websites. HTML elements such as < ifrmae > or < input > tags accompanied by indicative words such as "password" and "credit card" were previously suggested to be highly effective in detecting phishing websites [36,37]. Additional expert-based features, such as the number of anchors and links, were also investigated [38,39], and when combined with previous work, the authors achieved a true-positive rate (TPR) of 95% for the speci c scenario of phishing website detection.…”
Section: Related Workmentioning
confidence: 99%
“…jected, without having the user to execute applications to trigger the malicious code execution. Such attacks include "cross-site scripting" (XSS for short) (Yusof and Pathan, 2016) (Yu et al, 2011), malware injection (Khalil et al, 2014), SQL injection (Gruschka and Jensen, 2010;Dessiatnikoff et al, 2011), Javascript injection (Provos et al, 2009), OS commanding (Dessiatnikoff et al, 2011), XPATH injection (Saripalli and Walters, 2010;Dessiatnikoff et al, 2011), LDAP injection (Modi et al, 2013a;Skrupsky et al, 2012).…”
Section: Attack Categorization In the Cloudmentioning
confidence: 99%
“…Given the central role those infrastructures play, an in-depth understanding of their structures and the ways they work becomes critical for counteracting cybercrimes. To this end, prior research investigated the infrastructures associated with some types of channels (e.g., Spam [2], black-hat Search-Engine Optimization (SEO) [11]) and exploits (e.g., drive-by downloads [23]). What have been learnt includes the parties involved in a malicious campaign (e.g., affiliates, bot operators [28]), the underground economy behind such campaigns and how these parties work together [15], [12].…”
Section: Introductionmentioning
confidence: 99%