1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China 2 National Computer Network Emergency Response and Coordination Center,Beijing 100029,China
Online:2016-10-25
Published:2017-01-17
Supported by:
The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National High Technology Research and Development Program of China (863 Program)
LI Z , ALRWAIS S , XIE Y , et al. Finding the linchpins of the dark Web:a study on topologically dedicated hosts on malicious web infrastruc-tures[C]//IEEE Symposium on Security and Privacy (SP). 2013:112-126.
[2]
CANALI D , COVA M , VIGNA G , et al. Prophiler:a fast filter for the large-scale detection of malicious web pages[C]//The 20th Interna-tional Conference on World Wide Web. 2011:197-206.
[3]
ESHETE B , VILLAFIORITA A , WELDEMARIAM K . Binspect:holis-tic analysis and detection of malicious web pages[J]. Security and Pri-vacy in Communication Networks, 2013,106: 149-166.
[4]
PRAKASH P , KUMAR M , KOMPELLA R R , et al. Phishnet:predictive blacklisting to detect phishing attacks[C]//The 29th IEEE International Conference on Computer Communications (INFOCOM). 2010:1-5.
[5]
SHENG S , WARDMAN B , WARNER G , et al. An empirical analysis of phishing blacklists[C]//The 6th Conference in Email and Anti-Spam (CEAS). 2009.
[6]
LIU G , QIU B , LIU Y . Automatic detection of phishing target from phishing webpage[C]//The 20th International Conference on Pattern Recognition (ICPR). 2010:4153-4156.