CS Store Search
Displaying 1-5 out of 5 total
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs
By Mitsuaki Akiyama,Takeshi Yagi,Takeo Hariu
Issue Date:July 2013
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived, and they can be partially mutated to avoid blacklisting. Due to these characteristics, it...
Scalable and Performance-Efficient Client Honeypot on High Interaction System
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT)
By Mitsuaki Akiyama,Yuhei Kawakoya,Takeo Hariu
Issue Date:July 2012
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS ov...
Advanced Information Networking and Applications Workshops, International Conference on
By Gregory Blanc,Daisuke Miyamoto,Mitsuaki Akiyama,Youki Kadobayashi
Issue Date:March 2012
Obfuscation, code transformations that make the code unintelligible, is still an issue for web malware analysts and is still a weapon of choice for attackers. Worse, some researchers have arbitrarily decided to consider obfuscated contents as malicious alt...
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting
Applications and the Internet, IEEE/IPSJ International Symposium on
By Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh
Issue Date:July 2011
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived and their sub strings may be partially mutated to avoid blacklisting. Due to these charact...
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi
Issue Date:January 2007
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger of bots? malicious activities as the scale of botnets increases. Although it...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.