A quantitative approach to estimate a website security risk using whitelist
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Young-Gab | - |
dc.contributor.author | Lee, Minsoo | - |
dc.contributor.author | Cho, Sanghyun | - |
dc.contributor.author | Cha, Sungdeok | - |
dc.date.accessioned | 2021-09-06T14:51:35Z | - |
dc.date.available | 2021-09-06T14:51:35Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2012-10 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107287 | - |
dc.description.abstract | Despite much research on defense against phishing attacks, incidents continue to occur where sensitive (e.g., personal or financial) information is stolen using social engineering and technical spoofing techniques. Most approaches use the notions of blacklists versus whitelists (WWLs), and it is difficult to quantify the degree of a website's vulnerability against phishing attacks. In this paper, we present a quantitative approach for evaluating the phishing possibility of a given website using the refined security risk elements for domain and web page. Design and implementation of the website risk assessment system for antiphishing are also included. It can detect suspicious websites containing phishing attack and abnormal behavior and generates a warning if website is judged untrustworthy. Copyright (c) 2012 John Wiley & Sons, Ltd. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | DETECTION SYSTEM | - |
dc.subject | PHISHWISH | - |
dc.title | A quantitative approach to estimate a website security risk using whitelist | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Young-Gab | - |
dc.contributor.affiliatedAuthor | Cha, Sungdeok | - |
dc.identifier.doi | 10.1002/sec.420 | - |
dc.identifier.scopusid | 2-s2.0-84867609101 | - |
dc.identifier.wosid | 000309238700012 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.5, no.10, pp.1181 - 1192 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 5 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 1181 | - |
dc.citation.endPage | 1192 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | DETECTION SYSTEM | - |
dc.subject.keywordPlus | PHISHWISH | - |
dc.subject.keywordAuthor | phishing | - |
dc.subject.keywordAuthor | pharming | - |
dc.subject.keywordAuthor | website security risk | - |
dc.subject.keywordAuthor | website blacklist | - |
dc.subject.keywordAuthor | website whitelist | - |
dc.subject.keywordAuthor | risk analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.