ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim, Yong-Min Kim, Journal of Information Processing Systems Vol. 12, No. 3, pp. 422-435, Sep. 2016
https://doi.org/10.3745/JIPS.03.0045
Keywords: Drive-by download, Malware Distribution Network, Webpage Link Analysis, Web security
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Choi, S., Kim, D., & Kim, Y. (2016). ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. Journal of Information Processing Systems, 12(3), 422-435. DOI: 10.3745/JIPS.03.0045.
[IEEE Style]
S. Choi, D. Kim, Y. Kim, "ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks," Journal of Information Processing Systems, vol. 12, no. 3, pp. 422-435, 2016. DOI: 10.3745/JIPS.03.0045.
[ACM Style]
Sang-Yong Choi, Daehyeok Kim, and Yong-Min Kim. 2016. ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. Journal of Information Processing Systems, 12, 3, (2016), 422-435. DOI: 10.3745/JIPS.03.0045.