Search For:

Displaying 1-5 out of 5 total
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs
Found in: IT Professional
By Mitsuaki Akiyama,Takeshi Yagi,Takeo Hariu
Issue Date:July 2013
pp. 50-56
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived, and they can be partially mutated to avoid blacklisting. Due to these characteristics, it...
 
Scalable and Performance-Efficient Client Honeypot on High Interaction System
Found in: 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT)
By Mitsuaki Akiyama,Yuhei Kawakoya,Takeo Hariu
Issue Date:July 2012
pp. 40-50
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS ov...
 
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Gregory Blanc,Daisuke Miyamoto,Mitsuaki Akiyama,Youki Kadobayashi
Issue Date:March 2012
pp. 344-351
Obfuscation, code transformations that make the code unintelligible, is still an issue for web malware analysts and is still a weapon of choice for attackers. Worse, some researchers have arbitrarily decided to consider obfuscated contents as malicious alt...
 
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting
Found in: Applications and the Internet, IEEE/IPSJ International Symposium on
By Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh
Issue Date:July 2011
pp. 1-10
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived and their sub strings may be partially mutated to avoid blacklisting. Due to these charact...
 
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi
Issue Date:January 2007
pp. 82
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger of bots? malicious activities as the scale of botnets increases. Although it...
 
 1