Park et al., 2006 - Google Patents
Securing Web Service by Automatic Robot Detection.Park et al., 2006
View HTML- Document ID
- 12733940609478247297
- Author
- Park K
- Pai V
- Lee K
- Calo S
- Publication year
- Publication venue
- USENIX Annual Technical Conference, General Track
External Links
Snippet
Web sites are routinely visited by automated agents known as Web robots, that perform acts ranging from the beneficial, such as indexing for search engines, to the malicious, such as searching for vulnerabilities, attempting to crack passwords, or spamming bulletin boards …
- 238000001514 detection method 0 title description 21
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Park et al. | Securing Web Service by Automatic Robot Detection. | |
| Ur Rehman et al. | DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) | |
| Zhang et al. | Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing | |
| Oest et al. | Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis | |
| Chin et al. | Phishlimiter: A phishing detection and mitigation approach using software-defined networking | |
| Kondracki et al. | Catching transparent phish: Analyzing and detecting mitm phishing toolkits | |
| Zhang et al. | Arrow: Generating signatures to detect drive-by downloads | |
| Kartaltepe et al. | Social network-based botnet command-and-control: emerging threats and countermeasures | |
| US8495742B2 (en) | Identifying malicious queries | |
| Akiyama et al. | HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle | |
| Paulauskas et al. | Local outlier factor use for the network flow anomaly detection | |
| Lin et al. | Genetic-based real-time fast-flux service networks detection | |
| Mohaisen | Towards automatic and lightweight detection and classification of malicious web contents | |
| Bherde et al. | Recent attack prevention techniques in web service applications | |
| Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
| Dabbour et al. | Efficient assessment and evaluation for websites vulnerabilities using SNORT | |
| Wan et al. | PathMarker: protecting web contents against inside crawlers | |
| Kondracki et al. | The droid is in the details: Environment-aware evasion of android sandboxes | |
| Lee et al. | Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites | |
| Shahriar et al. | PhishTester: automatic testing of phishing attacks | |
| Roopak et al. | On effectiveness of source code and SSL based features for phishing website detection | |
| McKenna | Detection and classification of Web robots with honeypots | |
| Liao et al. | Cloud repository as a malicious service: challenge, identification and implication | |
| Evers et al. | Thirteen years of Tor attacks | |
| Qassrawi et al. | Detecting malicious web servers with honeyclients |