Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.3.481

Development of Rule-Based Malicious URL Detection Library Considering User Experiences  

Kim, Bo-Min (Seoul Women's University)
Han, Ye-Won (Seoul Women's University)
Kim, Ga-Young (Seoul Women's University)
Kim, Ye-Bun (Seoul Women's University)
Kim, Hyung-Jong (Seoul Women's University)
Abstract
The malicious URLs which can be used for sending malicious codes and illegally acquiring private information is one of the biggest threat of information security field. Particularly, recent prevalence of smart-phone increases the possibility of the user's exposing to malicious URLs. Since the way of hiding the URL from the user is getting more sophisticated, it is getting harder to detect it. In this paper, after conducting a survey of the user experiences related to malicious URLs, we are proposing the rule-based malicious URL detection method. In addition, we have developed java library which can be applied to any other applications which need to handle the malicious URL. Each class of the library is implementation of a rule for detecting a characteristics of a malicious URL and the library itself is the set of rule which can have the chain of rule for deteciing more complicated situation and enhancing the accuracy. This kinds of rule based approach can enhance the extensibility considering the diversity of malicious URLs.
Keywords
Mailcious URL Detection; Rule Base; Rule-chain; Android Programming; Java Library;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Core, "Phishing websites features", https://core.ac.uk/download/pdf/30732240.pdf, Mar, 2020
2 Wan Nurulsafawati Wan Manan, Abdul Ghani Ali Ahmed, and Mohd Nizam Mohmad Kahar, Intelligent Computing& Optimization, pp. 210-218, Springer International Publishing, Jan, 2019
3 Ram B.Basnet, Andrew H. Sung, and Quingzhong Liu, "Learning to detect phishing urls," International Journal of Research in Engineering and Technology, vol. 3, no. 6, pp. 11-24, June, 2014   DOI
4 Yong-bum Cha, "Proactive response against smishing using shorten url," Journal of Digital Forensics, 9(1), pp. 19-31, June, 2015   DOI
5 Ji-sun Park, "Based on url pattern analysis preventive measures against harmful sites," Master's Thesis, Konkuk University, Nov. 2018
6 KISA, Malware Hidden Site Detection Trend Report[The first half of 2019], Jul, 2019
7 KISA, Malware Hidden Site Detection Trend Report[The second half of 2019], Jan, 2020
8 CJLOGITICS, "CJ Parcel Service", https://www.cjlogistics.com/ko/newsroom/notice/NR_00000010, Mar. 7, 2020
9 Jeong-Wu Ha, Hyu-Kang Kim, Jong-in Lim, "Research on malicious code hidden website detection method through whitelist-based malicious code behavior analysis," Journal of The Korea Institute of Information Security and Cryptology(JKIISC), 21(4), pp. 61-75, Aug. 2011
10 Jae-Kyung Park, "A study of realtime malware url detection & prevention in mobile environment," Journal of The Korea Society of Computer and Information, 20(6), pp. 37-42, June. 2015   DOI
11 Anhlab, "V3 mobile security," https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=19, Mar 25, 2020
12 Pill App, "EST Security",https://www.estsecurity.com/, Mar. 26, 2020
13 Java Jsoup Library, "Jsoup Library", https://www.jsoup.org/, Mar. 7. 2020
14 Dongwon Seo, Arindam Khan, and Heejo Lee, "A study on detecting malcodes distribution sites," Korean Information Processing Society, 15(2), pp. 1-4, Nov. 2008
15 Jiho Cho, "A study on smishing detection technique using taintdroid," Convergence Security Journal, 15(1), pp. 3-9, Feb. 2015
16 Ho-Kyoung Shin, Ji-Myoung Shin, and Ho Lee, "A study on the factors infulencing information sharing in the social network services," Journal of Information Management, 42(1), pp. 137-156, Jan, 2011   DOI