Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer and Computer Intelligence (ICCCI 2011)
By
ISBN:
9780791859926
No. of Pages:
740
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
36 An Analysis Meathod for Malicious Links Detection Based on Webpage Script Text
By
Jing Tao
,
Jing Tao
Network Center of China Science & Technology Network Computer Network Information Center,
Chinese Academy of Sciences
, Beijing, 100190
, China
Search for other works by this author on:
Li Jun
,
Li Jun
Network Center of China Science & Technology Network Computer Network Information Center,
Chinese Academy of Sciences
, Beijing, 100190
, China
Search for other works by this author on:
Xing Rong
Xing Rong
Network Center of China Science & Technology Network Computer Network Information Center,
Chinese Academy of Sciences
, Beijing, 100190
, China
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Tao, J, Jun, L, & Rong, X. "An Analysis Meathod for Malicious Links Detection Based on Webpage Script Text." International Conference on Computer and Computer Intelligence (ICCCI 2011). Ed. Xie, Y. ASME Press, 2011.
Download citation file:
With the popularity of web applications, the phenomenon of web falsified and spreading of the trojan and virus via web vulnerabilities is becoming increasingly common. To solve this problem, we use a web script text feature analysis for webpage, discussed of the status of security-related analysis. Firstly, according to the current analysis of trojan web links and existing problems, we propose a model for webpage links analysis whin its source code, and describe the security-related algorithm of web links. After that we describe the algorithm with mathematical language. Finally, we analyze and summarize the experimental results, and verify the reliability and rationality of algorithm.
Abstract
Key Words
1. Introduction
2. Model Description
3. Mathematical Representation
4. Experimental Analysis
5. Conclusion
6. Acknowledgements
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Integrity Management of Critical Systems Introduction
Asset Integrity Management of Critical Infrastructure
Securouter — A Novel Dynamic Firewall System Embedded with IDS Integration
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Application of Modified Adaptive Tabu Search to Dynamic Economic Load Dispatch
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)
Detecting the Watermarked Image in Visual CAPTCHA Format and Getting Its Encrypted Information
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
Related Articles
The Need for Integrated Cybersecurity and Safety Training
ASME J of Nuclear Rad Sci (October,2018)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
A Design Optimization Method Using Evidence Theory
J. Mech. Des (July,2006)