An Implementation of System for Detecting and Filtering Malicious URLs |
Chang, Hye-Young
(단국대학교 정보컴퓨터학과)
Kim, Min-Jae (단국대학교 컴퓨터학과) Kim, Dong-Jin (단국대학교 컴퓨터학과) Lee, Jin-Young (단국대학교 컴퓨터학과) Kim, Hong-Kun (한국인터넷진흥원) Cho, Seong-Je (단국대학교 컴퓨터학부) |
1 | Christian Seifert, "Know Your Enemy: Malicious Web Servers," The Honeynet Project, KYE paper, Aug. 2007. |
2 | Kathy Wang, "Using Honeyclients for Detection an Response Against New Attacks," MITRE, http:// www.cerias.purdue.edu/assets/symposium/2008-panels/Wang-Honeyclients-CERIAS-Symposium-18M ar08-v2.pdf |
3 | Yi-Min, et. al., "Strider HoneyMonkeys: Active, Client-Side Honeypots for Finding Malicious Websites," To be appear in IEEE Transactions on Computers, May 2007. |
4 | Yi-Min Wang, Doug Beck, et. al., "Automated Web Patrol with Strider HoneyMonkeys," Proc. of the Networks and Distributed System Security Symposium, pp.35-49, Feb. 2006. |
5 | Alexander Moshchuk, Tanya Bragin, et. al., "A Crawler-based Study of Spyware on the Web," Proc. of the 2006 Networks and Distributed System Security Symposium, pp.17-33, Feb. 2006. |
6 | N. Proves, D. McNamee, et. al., "The Ghost In The Browser Analysis of Web-based Malware," Proc. of the first USENIX workshop on hot topics in Botnets, Apr. 2007. |
7 | Niels Provos, Google's Anti-Malware Team, "All Your iFrame Are Point to Us," Google Technical Report provos-2008a, February 11, 2008. |