Identifying malicious web infrastructures

作者: Jiyong Jang , Jialong Zhang , Ting Wang , Xin Hu

DOI:

关键词: ServerComputer networkGraphBipartite graphDistributed computingComputer science

摘要: Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible and invisible involved in network traffic redirection chains are determined based on graph-based features within a bipartite graph the distance-based chains. identified Access by client devices blocked graph.

参考文章(18)
Andrei Venzhega, Polina Zhinalieva, Nikolay Suboch, Graph-based malware distributors detection the web conference. pp. 1141- 1144 ,(2013) , 10.1145/2487788.2488136
Pratyusa Kumar Manadhata, Marc R. Eisenbarth, Stuart Haber, Sandeep Yadav, William G. Horne, Prasad V. Rao, Inferring a state of behavior through marginal probability estimation ,(2012)
Maxime Dumas, Michael J. McGuffin, Jean-Marc Robert, Marie-Claire Willig, Optimizing a Radial Layout of Bipartite Graphs for a Tool Visualizing Security Alerts Graph Drawing. pp. 203- 214 ,(2012) , 10.1007/978-3-642-25878-7_20
Marco Mellia, Ruben Torres, Pang-Ning Tan, Sabyasachi Saha, Antonio Nucci, Jianpeng Xu, Lei Liu, Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information advances in social networks analysis and mining. pp. 150- 157 ,(2014) , 10.5555/3191835.3191866
Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, George Varghese, Network monitoring using traffic dispersion graphs (tdgs) Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07. pp. 315- 320 ,(2007) , 10.1145/1298306.1298349
Aristides Gionis, Barbara Poblete, Method And System For Generating A Hyperlink-Click Graph ,(2008)