[1] |
诸葛建伟, 韩心慧 等. HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J]. 通信学报, 2007,12(28):8-13. ZHU GE J W , HAN X H , et al. HoneyBow: an automated malware collection tool based on the high-interaction honeypot principle[J]. Journal of Communications, 2007,12(28):8-13.
|
[2] |
PRAKASH P , KUMAR M , KOMPELLA R R , et al. Phishnet: predic-tive blacklisting to detect phishing attacks[A]. Proceedings of INFO-COM[C]. San Diego,CA,USA, 2010.1-5.
|
[3] |
AKIYAMA M , YAGI T , ITOH M . Searching structural neighborhood of malicious urls to improve blacklisting[A]. Proceeding of the 11th Symposium on Applications and the Internet (SAINT)[C]. Munich,Germany, 2011.1-10.
|
[4] |
Kapaersky security bulletin.statistics 2012[EB/OL]. , 2014.
|
[5] |
REPORT G T Making the Web safer[EB/OL]. , 2014.
|
[6] |
Smartscreen filter[EB/OL]. , 2014.
|
[7] |
Google chrome and google safe browsing[EB/OL]. , 2014.
|
[8] |
KOLBITSCH C , LIVSHITS B , ZORN B , et al. Rozzle: De-cloaking internet malware[A]. IEEE Symposium on Security and Privacy (S&P)[C]. San Francisco,USA, 2012.443-457.
|
[9] |
BANDO M , ARTAN N S , CHAO H J . Scalable look ahead regular expression detection system for deep packet inspection[J]. Transactions on Networking,IEEE/ACM, 2012,20(3):699-714.
|
[10] |
JIANG J , SONG X , YU N , et al. Focus: learning to crawl Web forums[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(6):1293-1306.
|
[11] |
MA J , SAUL L K , SAVAGE S , et al. Beyond blacklists: learning to detect malicious Web sites from suspicious URL[A]. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Dis-covery and Data Mining[C]. Paris,France, 2009.1245-1254.
|
[12] |
PAK W , CHOI Y J . High-performance packet classification for net-work-device platforms[J]. Communications Letters,IEEE, 2013,17(6):1252-1255.
|
[13] |
ZHANG F G . Preventing recommendation attack in trust-based re-commender systems[J]. Journal of Computer Science and Technology, 2011,26(5):823-828.
|
[14] |
MA J , SAUL L K , SAVAGE S , et al. Learning to detect malicious URLs[J]. Transactions on Intelligent Systems and Technology, 2011,2(3):30.
|
[15] |
CHANG C C , LIN C J . LIBSVM: a library for support vector ma-chines[J]. Transactions on Intelligent Systems and Technology,ACM, 2011,2(27):1-27.
|
[16] |
LEE S , KIM J . Warningbird: a near real-time detection system for suspicious urls in twitter stream[J]. Transactions on Dependable and Secure Computing,IEEE, 2013,10(3):183-195.
|
[17] |
TSANG P P , KAPADIA A , CORNELIUS C , et al. Nymble: blocking misbehaving users in anonymizing networks[J]. Transactions on De-pendable and Secure Computing,IEEE, 2011,8(2):256-269.
|
[18] |
LE A , MARKOPOULOU A , FALOUTSOS M . Phishdef: URL names say it all[A]. Proceeding of the 30th IEEE International Conference on Computer Communications (IEEE INFOCOM 2011)[C]. Shanghai,China, 2011.191-195.
|
[19] |
刘昕, 贾春福, 刘国友 等. 基于社会信任的恶意网页协防机制[J]. 通信学报, 2013,12(33):11-18. LIU X , JIA C F , LIU G Y , et al. Collaborative defending scheme against malicious Web pages based on social trust[J]. Journal on Communications, 2013,12(33):11-18.
|
[20] |
INVERNIZZ I , LUC A , et al. Evilseed: a guided approach to finding malicious Web pages[A]. IEEE Symposium on Security and Privacy (S&P)[C]. San Francisco,USA, 2012.428-442.
|
[21] |
China Webmaster[EB/OL]. , 2014.
|