2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW) 2016
DOI: 10.1109/wiw.2016.014
|View full text |Cite
|
Sign up to set email alerts
|

Toward Detecting Malicious Links in Online Social Networks through User Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…However, connecting to DNS or Whois also requires on average a 1.6 second delay [64] which is time expensive. Phishers can also avoid presenting accurate host features by using link shortners, web hosting services [92], or using compromised accounts so that registrations appear associated with the compromised account owner and not the phisher [93]. Some of these avoidances can be themselves used as features, for example, identifying if the host information is hosting provider or a link shortening service [92].…”
Section: B Host Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…However, connecting to DNS or Whois also requires on average a 1.6 second delay [64] which is time expensive. Phishers can also avoid presenting accurate host features by using link shortners, web hosting services [92], or using compromised accounts so that registrations appear associated with the compromised account owner and not the phisher [93]. Some of these avoidances can be themselves used as features, for example, identifying if the host information is hosting provider or a link shortening service [92].…”
Section: B Host Featuresmentioning
confidence: 99%
“…[51,57,60,89]). While these three dates are commonly used in research, the domain age is the most commonly used, with a range of definitions for "recent" -2 [93], 3 [94], or 6 months [65,95]. Fang et al, [95] found that approximately 95% of the phishing URLs in their dataset were less than six months old and Hao et al [96] found 55% of domains appeared the day after they were registered.…”
Section: B Host Featuresmentioning
confidence: 99%
“…[20]. Alghamdi et al analyzed and evaluated the detection of malicious URLs in existing social networks and explained that the future detection work needs to combine the characteristics of URLs with other aspects [21]. Han et al designed a honeypot system that for the first time analyzed the entire life cycle of a phishing attack and clearly identified victims from the attackers and other third-party visitors [22].…”
Section: Related Workmentioning
confidence: 99%
“…However, it has opened up its users to harmful activities. Committing fraud and propagating malware are criminal actions wherein users are engaged to access a URL and run a malicious code on the computer of an OSN user [16].…”
Section: Malwarementioning
confidence: 99%