实时检测系统的恶意url

Nupur S. Gawale, N. Patil
{"title":"实时检测系统的恶意url","authors":"Nupur S. Gawale, N. Patil","doi":"10.1109/CICN.2014.181","DOIUrl":null,"url":null,"abstract":"Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Real Time Detection System for Malicious URLs\",\"authors\":\"Nupur S. Gawale, N. Patil\",\"doi\":\"10.1109/CICN.2014.181\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.\",\"PeriodicalId\":6487,\"journal\":{\"name\":\"2014 International Conference on Computational Intelligence and Communication Networks\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2014.181\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2014.181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

如今,在在线社交媒体的背景下,黑客开始使用Twitter、Facebook、Google+等社交网络进行未经授权的活动。这些都是非常受欢迎的社交网站,许多人使用它们相互联系,并通过它分享他们每天发生的事情。在本文中,我们将twitter作为这样一个社交网站来进行实验。Twitter在微博上非常受欢迎,人们在这里发布140个字符的短消息,称为tweet。它有超过2亿的活跃用户,每天在墙上发布大约3亿条推文。黑客或攻击者开始利用Twitter作为传播病毒的媒介,因为可用的信息非常庞大和分散。它也很容易传播和张贴url在推特墙上。我们的实验展示了实时检测Twitter上的恶意url。我们测试了这种方法,使用频繁共享的URL来发现相关的URL重定向链。我们使用了基于URL重定向提取特征的tweet集合。然后我们找到相关url的入口点。爬虫浏览器标记可疑的URL。系统显示了恶意url检测的预期结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Real Time Detection System for Malicious URLs
Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Flow Control of all Vanadium Flow Battery Energy Storage Based on Fuzzy Algorithm Synthetic Aperture Radar System Using Digital Chirp Signal Generator Based on the Piecewise Higher Order Polynomial Interpolation Technique Frequency-Domain Equalization for E-Band Transmission System A Mean-Semi-variance Portfolio Optimization Model with Full Transaction Costs Detailed Evaluation of DEM Interpolation Methods in GIS Using DGPS Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1