Significant Factors for Detecting Malicious Redirections

被引:0
|
作者
Hans, Kanchan [1 ]
Ahuja, Laxmi
Muttoo, S. K.
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, India
关键词
redirection spam; malicious redirection; redirection attack; spam detection; factors;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious redirections refer to a technique where a genuine search user is befooled and made to pass through a chain of redirections and ultimately presented with a compromised web page that may be an adware or an irrelevant content for the user. As a consequence the search engines earn a bad name in quality information retrieval and moreover the users are too dissatisfied. Also, there is sever wastage of expensive network resources like bandwidth. Detecting these malicious redirections is important for quality information retrieval from web. But detecting such redirections is a very tedious task due to the genuine usage of redirections. Also, the conventional methods of spam detection such as blacklists, whitelists are not very successful as they need to be updated every time. This paper explores various reasons behind redirections and presents the redirection attack scenario. To design a more robust and reliable approach, we present some new factors that facilitate redirection spam detection. We also explored the operational profile of each identified factor along with the criteria for its selection.
引用
收藏
页码:499 / 502
页数:4
相关论文
共 50 条
  • [31] Detecting the Malicious Application using FRAppE
    Sultana, Yasmeen
    Khodanpur, B. I.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1027 - 1032
  • [32] Detecting Malicious Campaigns in Crowdsourcing Platforms
    Choi, Hongkyu
    Lee, Kyumin
    Webb, Steve
    [J]. PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 197 - 202
  • [33] Detecting malicious manipulation in grid enviromments
    Martins, Felipe
    Maia, Marcio
    de Castro Andrade, Rossana M.
    dos Santos, Aldri L.
    Neuman de Souza, Jose
    [J]. SBAC-OAD 2006: 18TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, 2006, : 28 - +
  • [34] Detecting Malicious Manipulation of Synchrophasor Data
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe H.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, : 145 - 150
  • [35] Detecting malicious short URLs on Twitter
    Nepali, Raj Kumar
    Wang, Yong
    Alshboul, Yazan
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [36] On Automatically Detecting Malicious Impostor Emails
    Kartaltepe, Erhan J.
    Xu, Shouhuai
    [J]. APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 33 - 47
  • [37] Method for Detecting Unknown Malicious Executables
    Rozenberg, Boris
    Gudes, Ehud
    Elovici, Yuval
    Fledel, Yuval
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 376 - 377
  • [38] Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities
    Shibahara, Toshiki
    Takata, Yuta
    Akiyama, Mitsuaki
    Yagi, Takeshi
    Yada, Takeshi
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 655 - 664
  • [39] Detecting Malicious Users in Online Dating Application
    Qiu, Jianhui
    Shen, Xingfa
    Guo, Yan
    Yao, Jian
    Fang, Renzhe
    [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260
  • [40] A method for detecting obfuscated calls in malicious binaries
    Lakhotia, A
    Kumar, EU
    Venable, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2005, 31 (11) : 955 - 968