2015
DOI: 10.1155/2015/756842
|View full text |Cite
|
Sign up to set email alerts
|

Method for Detecting Core Malware Sites Related to Biomedical Information Systems

Abstract: Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…MDNs are intelligent malicious networks that are built by attackers to perform persistent cyberattacks on unspecified users or selected organizations. Specifically, MDNs are composed of various types of malicious URLs containing malware (including landing sites, exploit sites, hopping sites, and distribution sites) that have mutually dependent relationships [3], and they are normally in an attack posture that is determined by the strategy of the attacker.…”
Section: Background and Related Work A Malware Distribution Network (...mentioning
confidence: 99%
“…MDNs are intelligent malicious networks that are built by attackers to perform persistent cyberattacks on unspecified users or selected organizations. Specifically, MDNs are composed of various types of malicious URLs containing malware (including landing sites, exploit sites, hopping sites, and distribution sites) that have mutually dependent relationships [3], and they are normally in an attack posture that is determined by the strategy of the attacker.…”
Section: Background and Related Work A Malware Distribution Network (...mentioning
confidence: 99%
“…Dom Kim et al [10], developed a method to identify malicious URLs of biomedical information system. This work dynamically estimates the risk index of the affected URL, by analyzing node characteristics, malicious code, IP address and country code.…”
Section: Related Workmentioning
confidence: 99%
“…Verification or identification biometric information systems can be either implemented on an existing system or built from scratch [1]. The verification method strives to validate an individual's claimed identity by checking their claims against several markers of individuality.…”
Section: Introductionmentioning
confidence: 99%