2018
DOI: 10.1016/j.cose.2018.01.013
|View full text |Cite
|
Sign up to set email alerts
|

Malicious URL protection based on attackers' habitual behavioral analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 1 publication
0
21
0
3
Order By: Relevance
“…The method consists of rolling back the virtual machine to the startup state in response to a trigger event of the virtual machine and loading the page content of the target URL for malicious detection. sung in Kim et al [2] analyzed the attacker's tactical behavior regarding URLs and extracted common features, divided them into three different feature pools to determine the degree of harm of unknown URLs, and used similarity matching techniques to improve the detection rate. This approach covers a large number of malicious URLs with a small set of features and the method only needs to examine the attributes of the URLs.Quan et al [3] proposed a new lexical approach to classify URLs by using machine learning techniques.…”
Section: Current Status Of Domestic and International Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The method consists of rolling back the virtual machine to the startup state in response to a trigger event of the virtual machine and loading the page content of the target URL for malicious detection. sung in Kim et al [2] analyzed the attacker's tactical behavior regarding URLs and extracted common features, divided them into three different feature pools to determine the degree of harm of unknown URLs, and used similarity matching techniques to improve the detection rate. This approach covers a large number of malicious URLs with a small set of features and the method only needs to examine the attributes of the URLs.Quan et al [3] proposed a new lexical approach to classify URLs by using machine learning techniques.…”
Section: Current Status Of Domestic and International Researchmentioning
confidence: 99%
“…Author details 1 School of information Technology and Engineering, Guangzhou College of Commerce, Guangzhou 510700, Guangdong, People's Republic of China. 2 College of Internet Finance and Information Engineering, Guangdong University of Finance, Guangzhou 510521, Guangdong, People's Republic of China.…”
Section: Availability Of Data and Materialsmentioning
confidence: 99%
“…To detect Malicious URL that leads to an exploit kit site, Eshete et al [9] and Kim et al [10] leveraged the abnormal behavior of EKs. WebWinnow [11] analyzed workflow of exploit kits and extracted features from their attack-centric and self-defense behavior.…”
Section: Background and Related Work A Exploit Kitsmentioning
confidence: 99%
“…WebWinnow [11] analyzed workflow of exploit kits and extracted features from their attack-centric and self-defense behavior. Kim et al [10] focused on attackers' habitual URL manipulation behavior and then employed similarity matching to classify suspicious URLs that have a similar character array.…”
Section: Background and Related Work A Exploit Kitsmentioning
confidence: 99%
“…The method consists of rolling back the virtual machine to the startup state in response to a trigger event of the virtual machine and loading the page content of the target URL for malicious detection. sung in Kim et al [2] analyzed the malicious URL protection of attackers' behavior habits, extracted common features, and put them in three different function pools to determine the harm degree of unknown URL, and used similarity matching techniques to improve the detection rate. The method covers a large number of malicious URLs with a small feature set, and only needs to check the properties of the URL.…”
Section: Introductionmentioning
confidence: 99%