Malicious URL protection based on attackers' habitual behavioral analysis

Cited 17 time in webofscience Cited 0 time in scopus
  • Hit : 988
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Sungjinko
dc.contributor.authorKim, Jinbokko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2018-10-19T00:50:36Z-
dc.date.available2018-10-19T00:50:36Z-
dc.date.created2018-02-24-
dc.date.created2018-02-24-
dc.date.created2018-02-24-
dc.date.issued2018-08-
dc.identifier.citationCOMPUTERS & SECURITY, v.77, pp.790 - 806-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/246179-
dc.description.abstractIn terms of URL-based features, some studies have classified malicious URLs into a group with the same attributes. However, the malicious URLs are of two different types, each of which produces entirely different results. Thus, depending on their intention, adversaries leave slightly different behavioral traces within the malicious URLs. This paper presents an in-depth empirical study conducted based on 1,529,433 malicious URLs collected over the past two years. In particular, we analyze attackers' tactical behavior regarding URLs and extract common features. We then divide them into three different feature pools to determine the level of compromise of unknown URLs. To leverage detection rates, we employ a similarity matching technique. We believe that new URLs can be identified through attackers' habitual URL manipulation behaviors. This approach covers a large set of malicious URLs with small feature sets. The accuracy of the proposed approach (up to 70%) is reasonable and the approach requires only the attributes of URLs to be examined. This model can be utilized during preprocessing to determine whether input URLs are benign, and as a web filter or a risk-level scaler to estimate whether a URL is malicious.-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.titleMalicious URL protection based on attackers' habitual behavioral analysis-
dc.typeArticle-
dc.identifier.wosid000447358600049-
dc.identifier.scopusid2-s2.0-85041677169-
dc.type.rimsART-
dc.citation.volume77-
dc.citation.beginningpage790-
dc.citation.endingpage806-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2018.01.013-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorKim, Jinbok-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorBehaviors-
dc.subject.keywordAuthorFuzzy-
dc.subject.keywordAuthorMalicious URL-
dc.subject.keywordAuthorSimilarity matching-
dc.subject.keywordAuthorWeb-filtering-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 17 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0