浏览全部资源
扫码关注微信
1. 中国科学院 信息工程研究所,北京 100093
2. 国家计算机网络应急技术处理协调中心,北京 100029
[ "林海伦(1987-),女,山东临沂人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为数据挖掘、知识图谱。" ]
[ "李焱(1984-),男,湖北随州人,国家计算机网络应急技术协调中心工程师,主要研究方向为分布式系统和云计算。" ]
[ "王伟平(1975-),男,吉林舒兰人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为大数据存储与处理。" ]
[ "岳银亮(1982-),男,河南许昌人,博士,中国科学院信息工程研究所副研究员,主要研究方向为大数据存储与智能化处理。" ]
[ "林政(1984-),女,山东青岛人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为自然语言处理、情感分析。" ]
网络出版日期:2015-11,
纸质出版日期:2015-11-25
移动端阅览
林海伦, 李焱, 王伟平, 等. 高效的基于段模式的恶意URL检测方法[J]. 通信学报, 2015,36(Z1):141-148.
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Efficient segment pattern based method for malicious URL detection[J]. Journal on communications, 2015, 36(Z1): 141-148.
林海伦, 李焱, 王伟平, 等. 高效的基于段模式的恶意URL检测方法[J]. 通信学报, 2015,36(Z1):141-148. DOI: 10.11959/j.issn.1000-436x.2015293.
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Efficient segment pattern based method for malicious URL detection[J]. Journal on communications, 2015, 36(Z1): 141-148. DOI: 10.11959/j.issn.1000-436x.2015293.
提出一种高效的基于段模式的检测恶意URL的方法,该方法首先解析已标注的恶意URL中的域名、路径名和文件名3个语义段,然后通过建立以三元组为词项的倒排索引快速计算恶意URL每个语义段的模式,最后基于倒排索引查找到的段模式来判定给定的URL是否是恶意URL。不仅如此,该方法还支持基于Jaccard的随机域名识别技术来判定包含随机域名的恶意URL。实验结果表明,与当前先进的基准方法相比,该方法具有较好的性能和可扩展性。
An efficient segment based method for detecting malicious URL was proposed.Firstly it analyzed the annotated malicious URLs in terms of three semantic segments
i.e.
domain segment
path segment and file segment.Secondly it quickly calculated the common pattern of each semantic segment exploiting the tri-gram model based inverted index.Finally it decided whether a given URL was malicious based on the segment patterns returned by searching the inverted index.Moreover
this method also supported the Jaccard based random domain name identification technique for deciding malicious URLs with random domain name.Experimental results show that proposed method outperforms the state-of-the-art baseline methods
and can achieve good efficiency and scalability on malicious URL detection.
Ponenom Institute . 2014 Global Report on the Cost of Cyber Crime [R ] . 2014 .
PORRAS P , SAIDI H . YEGNESWARAN V . Conficker C P2P Protocol and Implementation [R ] . SRI International Tech.Rep . 2009 .
PORRAS P , SAIDI H , YEGNESWARAN V . An Analysis of Conficker’s Logic and Rendezvous Points [R ] . SRI International Tech.Rep , 2009 .
https://url.spec.whatwg.org/ [EB/OL ] . 2015 .
HENZINGE T A , RASKIN J C C O . The equivalence problem for finite automata:technical perspective [J ] . Communications of the ACM , 2015 , 58 ( 2 ): 86 - 86 .
PRAKASH P , KUMAR M , KOMPELLA R R , et al . Phishnet:predictive blacklisting to detect phishing attacks [A ] . Proceedings of IEEE International Conference on Computer Communications [C ] . 2010 . 1 - 5 .
LIKARISH P , JUNG E . Leveraging Google safe browsing to characterize Web-based attacks [A ] . Association for Computing Machinery [C ] . 2009 .
PROVOS N , MAVROMMATIC P , RAJAB M A , et al . All your iframes point to us [A ] . Proceedings of the 17th Usenix Security Symposium [C ] . 2008 . 1 - 16 .
MOSHCHUK A , BRAGIN T , GRIBBLE S D , et al . A crawler-based study of spyware in the Web [A ] . Proceedings of the Network and Distributed System Security Symposium [C ] . 2006 .
ZHANG Y , HONG J , CRANOR L . Cantina:a content-based approach to detecting phishing Web sites [A ] . Proceedings of 16th International Conference on World Wide Web [C ] . 2007 . 639 - 648 .
许杰 . 云安全模式下恶意URL实时检测系统的设计与测试 [D ] . 北京:北京邮电大学 , 2014 .
XU J . Design and Testing of Malicious URL Real-time Detecting System Working in the Mode of Cloud Security [D ] . Beijing University of Posts and Telecommunications , 2014 .
GARERA S , PROVOS N , CHEW M . A framework for detection and measurement of phishing attacks [A ] . Proceedings of 5th ACM Workshop on Recurring Malcode [C ] . 2007 . 1 - 8 .
MA J , SAUL L K , SAVAGE S , et al . Beyond blacklists:learning to detect malicious Web sites from suspicious URLs [A ] . Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining [C ] . 2009 . 1245 - 1254 .
MA J , SAUL L K , SAVAGE S , et al . Identifying suspicious URLs:an application of large-scale online learning [A ] . Proceedings of the 26th International Conference on Machine Learning [C ] . 2009 . 681 - 688 .
THOMAS K , GRIER C , MA J , et al . Design and evaluation of a real-time url spam filtering service [A ] . Proceedings of the 2011 IEEE Symposium on Security and Privacy [C ] . 2011 . 447 - 462 .
HUANG D , XU K , PEI J . Malicious URL detection by dynamically mining patterns without pre-defined elements [J ] . World Wide Web , 2014 , 17 ( 6 ): 1375 - 1394 .
HAN J W , KAMBER M , PEI J . Data Mining:Concepts and Techniques [M ] . Beijing:China Machine Press . 2012 .
YADAV S , REDDY A K , RANJAN S . Detecting algorithmically generated malicious domain names [A ] . Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement [C ] . 2010 . 48 - 61 .
0
浏览量
1867
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构