作者: Henry Uyeno , Vinay Pidathala
DOI:
关键词:
摘要: According to one embodiment, in response receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL are removed from the based on list link signatures. For each remaining that unknown, analysis is performed heuristics determine whether suspicious. suspicious links, dynamic link. It classified behavior during analysis.