2016 IEEE Symposium on Computers and Communication (ISCC) 2016
DOI: 10.1109/iscc.2016.7543735
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of malware download sites by focusing on time series variation of malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
4
0
1
Order By: Relevance
“…In addition to an online web interface [44], VirusTotal also provides an API [45] for scanning larger volume of URLs. Researchers frequently use VirusTotal to label URLs in their dataset, with several published literature depending on it to create their ground truth for malicious URLs [46], [12], [47], [11], [48], [49]. We use VirusTotal in a similar way to determine what portion of scanners detect the URLs in our dataset in Section III-A, and later on in Sections IV-A and V-A to compare the detection statistics between phishing and drive-by URLs which were and were not detected by Twitter.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to an online web interface [44], VirusTotal also provides an API [45] for scanning larger volume of URLs. Researchers frequently use VirusTotal to label URLs in their dataset, with several published literature depending on it to create their ground truth for malicious URLs [46], [12], [47], [11], [48], [49]. We use VirusTotal in a similar way to determine what portion of scanners detect the URLs in our dataset in Section III-A, and later on in Sections IV-A and V-A to compare the detection statistics between phishing and drive-by URLs which were and were not detected by Twitter.…”
Section: Background and Related Workmentioning
confidence: 99%
“…We collected and analyzed more than 132k unique URLs, which had been collected from over 3 million posts, spread out over three different time periods of the year (January, June and November 2020). Using VirusTotal, an online tool to scan websites with multiple scanning engines at the same time, which is used by both regular users and the research community alike [11], [12], [13], [14], [15], [16]. We initially labelled 4.5k URLs as 'malicious' based on the scores provided by VirusTotal, and then manually investigated each of them to check if they were indeed so.…”
mentioning
confidence: 99%
“…4 represents the whole malware analysis types and techniques that are used for securing web applications. Authors apply a multi criteria decision making (MCDM) approach called fuzzy-Analytical Hierarchy Process (AHP) for evaluating the priority and finding the most prioritized approach and type of malware analysis [46][47][48][49][50][51][52]. Fuzzy-AHP is methodology that is pre-verified and authors has expertise in fuzzy-based various MCDM approaches through their previous experience [53][54][55][56].…”
Section: Ranking Examinationmentioning
confidence: 99%
“…The authors found that there is no SLR on malware analysis for securing the web application, though there were many other surveys that discussed other related domains likethe static analysis, dynamic analysis of malware and malware detection survey and others. One of the examples in this context is that of Rami Sihwail et al The study provides a brief discussion on current malware analysis techniques [48], classification of malware in the current situation and also provides literature about different kinds of malware detection methods. There are some other related papers present in the study [49,50,75].…”
Section: Minimum Number Of Related Articles and Research Endeavorsmentioning
confidence: 99%
“…Drive-by-download: esta técnica realiza la descarga y ejecución no intencional de software malicioso cuando se visita una página web comprometida [86]. El malware se descarga "sigilosamente" sin el conocimiento de los usuarios, aprovechando las brechas de seguridad, los exploits en los navegadores o los plugins integrados como ActiveX, Java/JavaScript o Adobe Flash player [67].…”
Section: Red Informática En La Organizaciónunclassified