2016
DOI: 10.1007/s11277-016-3866-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure Short URL Generation Method that Recognizes Risk of Target URL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
5
0
1
Order By: Relevance
“…Malicious URLs contains vulnerabilities and poses a significant threat to the computer. This malicious website threat has become an important rising issue [17,18,19]. Many studies have been proposed for analyzing and detecting malicious URLs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Malicious URLs contains vulnerabilities and poses a significant threat to the computer. This malicious website threat has become an important rising issue [17,18,19]. Many studies have been proposed for analyzing and detecting malicious URLs.…”
Section: Related Workmentioning
confidence: 99%
“…Many types of research concerned about the risk and impact on their computer when surfing website. In [18] proposed risk assessment to monitor the risk on URL by using the destination information when generating a short URL. By monitoring URL, any risky URL or risk over the threshold will be blocked to prevent malicious attack [19], especially from drive-by download through the short URL.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, most of the attacker sends a short URL to victims, and it is difficult to verify which file or webpage the short URL interfaces to users. Therefore, [ 35 ] proposed a method that composes the destination information of the short URL. Furthermore, the method analyzed the webpage and measured the risk of the webpage and blocked the short URL by comparing with predefined threshold.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The knowledge-based CES-D matrix is constructed based on highly reliable data determined from context information within the smart health system. The paper by Mun and Li [18] introduces a secure short URL-generation method that recognizes the risk posed by the target URL. The service provider of a short URL monitors the risk of the target URL page for the generated short URL and decides whether to provide the service.…”
mentioning
confidence: 99%