Development of Rule-Based Malicious URL Detection Library Considering User Experiences |
Kim, Bo-Min
(Seoul Women's University)
Han, Ye-Won (Seoul Women's University) Kim, Ga-Young (Seoul Women's University) Kim, Ye-Bun (Seoul Women's University) Kim, Hyung-Jong (Seoul Women's University) |
1 | Core, "Phishing websites features", https://core.ac.uk/download/pdf/30732240.pdf, Mar, 2020 |
2 | Wan Nurulsafawati Wan Manan, Abdul Ghani Ali Ahmed, and Mohd Nizam Mohmad Kahar, Intelligent Computing& Optimization, pp. 210-218, Springer International Publishing, Jan, 2019 |
3 | Ram B.Basnet, Andrew H. Sung, and Quingzhong Liu, "Learning to detect phishing urls," International Journal of Research in Engineering and Technology, vol. 3, no. 6, pp. 11-24, June, 2014 DOI |
4 | Yong-bum Cha, "Proactive response against smishing using shorten url," Journal of Digital Forensics, 9(1), pp. 19-31, June, 2015 DOI |
5 | Ji-sun Park, "Based on url pattern analysis preventive measures against harmful sites," Master's Thesis, Konkuk University, Nov. 2018 |
6 | KISA, Malware Hidden Site Detection Trend Report[The first half of 2019], Jul, 2019 |
7 | KISA, Malware Hidden Site Detection Trend Report[The second half of 2019], Jan, 2020 |
8 | CJLOGITICS, "CJ Parcel Service", https://www.cjlogistics.com/ko/newsroom/notice/NR_00000010, Mar. 7, 2020 |
9 | Jeong-Wu Ha, Hyu-Kang Kim, Jong-in Lim, "Research on malicious code hidden website detection method through whitelist-based malicious code behavior analysis," Journal of The Korea Institute of Information Security and Cryptology(JKIISC), 21(4), pp. 61-75, Aug. 2011 |
10 | Jae-Kyung Park, "A study of realtime malware url detection & prevention in mobile environment," Journal of The Korea Society of Computer and Information, 20(6), pp. 37-42, June. 2015 DOI |
11 | Anhlab, "V3 mobile security," https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=19, Mar 25, 2020 |
12 | Pill App, "EST Security",https://www.estsecurity.com/, Mar. 26, 2020 |
13 | Java Jsoup Library, "Jsoup Library", https://www.jsoup.org/, Mar. 7. 2020 |
14 | Dongwon Seo, Arindam Khan, and Heejo Lee, "A study on detecting malcodes distribution sites," Korean Information Processing Society, 15(2), pp. 1-4, Nov. 2008 |
15 | Jiho Cho, "A study on smishing detection technique using taintdroid," Convergence Security Journal, 15(1), pp. 3-9, Feb. 2015 |
16 | Ho-Kyoung Shin, Ji-Myoung Shin, and Ho Lee, "A study on the factors infulencing information sharing in the social network services," Journal of Information Management, 42(1), pp. 137-156, Jan, 2011 DOI |