최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기멀티미디어학회논문지 = Journal of Korea Multimedia Society, v.23 no.11, 2020년, pp.1396 - 1405
강홍구 (Security Threat Response R&D Team, Korea Internet & Security Agency) , 신삼신 (Security Threat Response R&D Team, Korea Internet & Security Agency) , 김대엽 (Security Threat Response R&D Team, Korea Internet & Security Agency) , 박순태 (Security Threat Response R&D Team, Korea Internet & Security Agency)
Cyber threats such as forced personal information collection and distribution of malicious codes using malicious URLs continue to occur. In order to cope with such cyber threats, a security technologies that quickly detects malicious URLs and prevents damage are required. In a web environment, malic...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
H.K. Kang, S.S. Shin, D.Y. Kim, and S.T. Park, "A Study on Analysis of Feature Information for Malicious URL Prediction," Proceeding of the 21th Conference on Electronics and Information Communications, pp. 1-4, 2019.
H.K. Kang, S.S. Shin, D.Y. Kim, and S.T. Park, "A Study on the Design of Malicious URL Prediction System Based on Machine Learning," Proceeding of the Korea Multimedia Society Conference, pp. 13-16, 2020.
Malicious Code Hidden Site Detection Trend Report in the First Half of 2020 (2020), https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence35537 (accessed July 29, 2020).
D. Sahoo, C. Liu, and S.C.H. Hoi, "Malicious URL Detection Using Machine Learning: A Survey," arXiv Preprint arXiv:1701.07179, 2017.
D. Patil and J. Patil, "Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique," Journal of Cybernetics and Information Technologies, Vol. 18, No. 1, pp. 11-29, 2018.
C. Wu, M. Li, L. Ye, X. Zou, and B. Qiang, "Malicious Website Detection Based on URLs Static Features," Proceeding of International Conference on Modeling, Simulation and Optimization, pp. 307-313, 2018.
J. Puchyr and M. Holena, "Random-forest-based Analysis of URL Paths," Proceeding of Conference on Information Technologies-applications and Theory, pp. 129-135, 2017.
G. Tan, P. Zhang, Q. Liu, X. Liu, C. Zhu, F. Dou, et al., "Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts," Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering, pp. 737-743, 2018.
B.A. Tama and K.H. Rhee, "A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles," Journal of Korea Multimedia Society, Vol. 21, No. 5, pp. 617-625, 2018.
Y. Zeng, Malicious URLs and Attachments Detection on Lexical-based Features using Machine Learning, Master's Thesis of Victoria University of Engineering, 2018.
S. Marchal, K. Saari, N. Singh, and N. Asokan, "Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets," Proceeding of the 36th IEEE International Conference on Distributed Computing Systems, pp. 323-333, 2016.
Predict Malicious Websites: XGBoost (2018), https://www.kaggle.com/craerek/predict-malicious-websites-xgboost. (accessed May 14, 2018)
H. Musa, D.A.Y. Gital, F.U. Zambuk, A. Umar, A.Y. Umar, J.U. Waziri, et al., "A Comparative Analysis of Phishing Website Detection Using XGBoost Algorithm," Journal of Theoretical and Applied Information Technology, Vol. 97, No. 5, pp. 1434-1443, 2019.
H.K. Pao, Y.L. Chou, and Y.J. Lee, "Malicious URL Detection Based on Kolmogorov Complexity Estimation," Proceedings of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology, pp. 380-387, 2012.
Y. Alshboul, R.K. Nepali, and Y. Wang, "Detecting Malicious Short URLs on Twitter," Proceeding of the 21th Americas Conference on Information Systems, pp. 1-7, 2015.
ALEXA(2020), https://www.alexa.com/ (accessed March 19, 2020)
OpenPhish(2020), https://openphish.com/ (accessed April 19, 2020)
PhishTank(2020), https://phishtank.com/ (accessed April 19, 2020)
H.S. Kim and I.S. Kim, "A Study on Characteristic Analysis and Countermeasure of Malicious Web Site," Journal of The Korea Institute of Information Security and Cryptology, Vol. 29, No. 1, pp. 93-103, 2019.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.