{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:48Z","timestamp":1726003968069},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_23","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"416-432","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching"],"prefix":"10.1007","author":[{"given":"Sungjin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Brent ByungHoon","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Shady paths: leveraging surfing crowds to detect malicious web pages. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 133\u2013144. ACM (2013)","DOI":"10.1145\/2508859.2516682"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Eshete, B., Venkatakrishnan, V.N.: Webwinnow: leveraging exploit kit workflows to detect malicious URLs. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, pp. 305\u2013312. ACM (2014)","DOI":"10.1145\/2557547.2557575"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"\u0160rndi\u0107, N., Laskov, P.: Hidost: a static machine-learning-based detector of malicious files. EURASIP J. Inf. Secur. 22 (2016)","DOI":"10.1186\/s13635-016-0045-0"},{"key":"23_CR4","unstructured":"Thug. https:\/\/www.honeynet.org\/taxonomy\/term\/218 . Accessed 6 Nov 2017"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"406","DOI":"10.4218\/etrij.17.0116.0810","volume":"39","author":"S Kim","year":"2017","unstructured":"Kim, S., Kim, S., Kim, D.: LoGos internet-explorer-based malicious webpage detection. ETRI J. 39, 406\u2013416 (2017). https:\/\/doi.org\/10.4218\/etrij.17.0116.0810","journal-title":"ETRI J."},{"key":"23_CR6","unstructured":"Edwards, D.: http:\/\/dean.edwards.name\/packer\/ . Accessed 12 Oct 2017"},{"key":"23_CR7","unstructured":"Levenshtein distance. https:\/\/en.wikipedia.org\/wiki\/Levenshtein_distance . Accessed 12 Oct 2017"},{"issue":"7","key":"23_CR8","first-page":"46","volume":"13","author":"JW Ratcliff","year":"1988","unstructured":"Ratcliff, J.W., Metzener, D.E.: Pattern-matching-the gestalt approach. Dr Dobbs J. 13(7), 46 (1988)","journal-title":"Dr Dobbs J."},{"key":"23_CR9","unstructured":"Dice similarity coefficient. https:\/\/en.wikipedia.org\/wiki\/sorensen-Dice_coefficient . Accessed 12 Oct 2017"},{"key":"23_CR10","unstructured":"Jaccard, P.: Distribution de la flore alpine dans le bassin des Dranses et dans quelques r\u00e9gions voisines. Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles pp. 241\u2013272 (1901)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Taylor, T., et al.: Detecting malicious exploit kits using tree-based similarity searches. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 255\u2013266. ACM (2016)","DOI":"10.1145\/2857705.2857718"},{"key":"23_CR12","unstructured":"Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In: NSDI, vol. 10, p. 14 (2010)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Cui, Q., Jourdan, G.V., Bochmann, G.V., Couturier, R., Onut, I.V.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web International World Wide Web Conferences Steering Committee, pp. 667\u2013676 (2017)","DOI":"10.1145\/3038912.3052654"},{"key":"23_CR14","unstructured":"Kapravelos, A., Shoshitaishvili, Y., Cova, M., Kruegel, C., Vigna, G.: Revolver: an automated approach to the detection of evasive web-based malware. In: USENIX Security Symposium, pp. 637\u2013652 (2013)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Stock, B., Livshits, B., Zorn, B.: Kizzle: a signature compiler for detecting exploit kits. In: 46th Annual IEEE\/IFIP International Conference Dependable Systems and Networks (DSN), IEEE (2016)","DOI":"10.1109\/DSN.2016.48"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: Proceedings of the 20th International Conference on World Wide Web, pp. 197\u2013206. ACM (2011)","DOI":"10.1145\/1963405.1963436"},{"key":"23_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-36883-7_10","volume-title":"Security and Privacy in Communication Networks","author":"B Eshete","year":"2013","unstructured":"Eshete, B., Villafiorita, A., Weldemariam, K.: BINSPECT: holistic analysis and detection of malicious web pages. In: Keromytis, A.D., Di Pietro, R. (eds.) SecureComm 2012. LNICST, vol. 106, pp. 149\u2013166. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36883-7_10"},{"key":"23_CR18","first-page":"11","volume":"11","author":"H Choi","year":"2011","unstructured":"Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. WebApps 11, 11 (2011)","journal-title":"WebApps"},{"key":"23_CR19","unstructured":"YARA. https:\/\/virustotal.github.io\/yara\/ . Accessed 25 Nov 2017"},{"key":"23_CR20","unstructured":"PhantomJS. http:\/\/phantomjs.org\/ . Accessed 25 Nov 2017"},{"key":"23_CR21","unstructured":"Malware-Traffic-Analysis.Net. http:\/\/www.malware-traffic-analysis.net\/ . Accessed 20 Feb 2018"},{"key":"23_CR22","unstructured":"Alexa. http:\/\/www.alexa.com\/topsites . Accessed 18 Nov 2017"},{"key":"23_CR23","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/ . Accessed 18 Nov 2017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T22:51:48Z","timestamp":1605912708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}