System and method for detecting malicious links in electronic messages

作者: Henry Uyeno , Vinay Pidathala

DOI:

关键词:

摘要: According to one embodiment, in response receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL are removed from the based on list link signatures. For each remaining that unknown, analysis is performed heuristics determine whether suspicious. suspicious links, dynamic link. It classified behavior during analysis.

参考文章(561)
George Cristian Chicioreanu, Anil Francis Thomas, Adrian Mihail Marinescu, Malware Detection Using Code Analysis and Behavior Monitoring ,(2008)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Benjamin Knott, John Martin, Scott Mills, Kurt Joseph, Theodore Pasquale, Robert Bushey, Method and system for automated categorization of statements ,(2002)
Yevgeniv Vishnevetsky, Olivier Masdebrieu, Abhiraman Anantharaman, William R. Dalgliesh, Oleg Vernik, Jeremey Hallenbeck, System and method for dynamic extension of aggregation engine ,(2008)
Oleg Barenboim, Joseph Fitzgerald, Compliance-based adaptations in managed virtual systems ,(2007)
Frank Apap, Andrew Honig, Hershkop Shlomo, Eleazar Eskin, Salvatore J Stolfo, System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses ,(2008)
John A. Copeland, Network port profiling ,(2002)