Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.6.473

SHRT : New Method of URL Shortening including Relative Word of Target URL  

Yoon, Soojin (고려대학교 정보보호대학원 정보보증 연구실)
Park, Jeongeun (고려대학교 정보보호대학원 정보보증 연구실)
Choi, Changkuk (고려대학교 정보보호대학원 정보보증 연구실)
Kim, Seungjoo (고려대학교 정보보호대학원 정보보증 연구실)
Abstract
Shorten URL service is the method of using short URL instead of long URL, it redirect short url to long URL. While the users of microblog increased rapidly, as the creating and usage of shorten URL is convenient, shorten url became common under the limited length of writing on microblog. E-mail, SMS and books use shorten URL well, because of its simplicity. But, there is no relativeness between the most of shorten URLs and their target URLs, user can not expect the target URL. To cover this problem, there is attempts such as changing the shorten URL service name, inserting the information of website into shorten URL, and the usage of shortcode of physical address. However, each ones has the limits, so these are the trouble of automation, relatively long address, and the narrowness of applicable targets. SHRT is complementary to the attempts, as getting the idea from the writing system of Arabic. Though the writing system of Arabic has no vowel alphabet, Arabs have no difficult to understand their writing. This paper proposes SHRT, new method of URL Shortening. SHRT makes user guess the target URL using Relative word of the lowest domain of target URL without vowels.
Keywords
URL Shortening; Usable Security; Phishing; Domain; Site Name;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E. P. Markatos, and T. Karagiannis, "We.b: the web of short urls," in Proc. 20th Int. Conf. World Wide Web, pp.715-724, Hyderabad, India, Mar. 2011.
2 D. K. McGrath and M. Gupta, "Behind phishing: an examination of Phisher modi operandi," in Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), article no. 4, San Francisco, U.S.A., Apr. 2008.
3 C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the underground on 140 characters or less," in Proc. 17th ACM Conf. Comput. Commun. Security (CCS'10), pp.27-37, Chicago, U.S.A., Oct. 2010.
4 G. Kontaxis, I. Polakis, M. Polychronakis, and E. P. Markatos, "dead.drop: URL-Based Stealthy Messaging," in Proc. 7th European Conf. Comput. Network Defense (EC2ND), pp.17-24, Gothenburg, Sweden, Sep. 2011.
5 E. Vishria, S. Carlos, T. Howes, L. Altos, and R. Churehill, "Integrated Adaptive URL-Shortening Functionality," U.S. Patent No. US 2011/0264992 A1, Oct. 2011.
6 S. L. Hancock, "Systems and methods for creating and using imbedded shortcodes and shortened physical and internet addresses," U.S. Patent 2011/0244882 A1, Oct. 2011.
7 J. Park, S. Yoon, and S. Kim, "A Phishing link prevention for QR code and shortend URL on smart phone," in Proc. CISC-S'12, pp. 241-245, Cheonan, Korea, June 2012.
8 I. Jo and H. Y. Yeom, "Evaluation of the domain-content relevancy as a key feature of Phishing detection," in Proc. Conf. KICS, pp. 789-791, Suwon, Korea, Nov. 2011.
9 Microsoft, Microsoft Exchange Server - Modify a Database Size Limit(2010), Retrieved Apr., 8, 2013, from http://technet.microsoft.com/en-us/library/bb23 2092.aspx
10 Whois Source, Domain Counts & Internet Statistics(2013), Retrieved Apr., 8, 2013, from http://www.whois.sc/internet-statistics
11 IETF, RFC 1738 Uniform Resource Locators(URL)(1994), Retrieved Apr., 8, 2013, from http://www.ietf.org/rfc/rfc1738.txt
12 KISA, Domain system(2013), Retrieved Apr., 8, 2013, from http://domain.kisa.or.kr/jsp/domain/domainInfo/domainSys.jsp
13 A. Neumann, J. Barnickel, and U. Meyer, "Security and privacy implications of URL shortening services," in Proc. Workshop on WEB 2.0 SECURITY AND PRIVACY (W2SP) 2011, pp. 1-10, Oakland, U.S.A., May 2011.
14 N. Megiddo, P. Alto, and K. S. McCurley, "Efficient Retrieval of Uniform Resource Locators," U.S. Patent No. 6,957,224 B1, Oct. 2005.