Risk prediction of malicious code-infected websites by mining vulnerability features
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, T. | - |
dc.contributor.author | Kim, D. | - |
dc.contributor.author | Jeong, H. | - |
dc.contributor.author | In, H.P. | - |
dc.date.accessioned | 2021-09-05T16:17:16Z | - |
dc.date.available | 2021-09-05T16:17:16Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/100866 | - |
dc.description.abstract | Malicious-code scanning tools are practically available for identifying suspicious websites. However, such tools only warn users about suspicious sites and do not provide clues as to why the sites were hacked and which vulnerability was responsible for the attack. In addition, the huge number of alarms burdens mangers while executing in-time-response duties. In this paper, a process involving feature modeling and data-mining techniques is proposed to help solve such problems. © 2014 SERSC. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.title | Risk prediction of malicious code-infected websites by mining vulnerability features | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | In, H.P. | - |
dc.identifier.doi | 10.14257/ijsia.2014.8.1.27 | - |
dc.identifier.scopusid | 2-s2.0-84893951234 | - |
dc.identifier.bibliographicCitation | International Journal of Security and its Applications, v.8, no.1, pp.291 - 294 | - |
dc.relation.isPartOf | International Journal of Security and its Applications | - |
dc.citation.title | International Journal of Security and its Applications | - |
dc.citation.volume | 8 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 291 | - |
dc.citation.endPage | 294 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Classification | - |
dc.subject.keywordAuthor | Feature modeling | - |
dc.subject.keywordAuthor | Vulnerability identification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.