{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:37:22Z","timestamp":1770273442077,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":16,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science and Technology, Vietnam","award":["KC.01.05\/16-20"],"award-info":[{"award-number":["KC.01.05\/16-20"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369730","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"508-513","source":"Crossref","is-referenced-by-count":6,"title":["A Multi-layer Model for Website Defacement Detection"],"prefix":"10.1145","author":[{"given":"Xuan Dau","family":"Hoang","sequence":"first","affiliation":[{"name":"Cyber Security Lab, Posts and Telecommunications Institute of Technology, Hanoi, Vietnam"}]},{"given":"Ngoc Tuong","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Cyber Security Lab, Posts and Telecommunications Institute of Technology, Hanoi, Vietnam"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369730-1","unstructured":"Digistar.vn. What is web defacement attack and defensive measures, https:\/\/www.digistar.vn\/tan-cong-giao-dien-deface-la-gi-va-cach-khac-phuc\/, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-2","unstructured":"M. Romagna, N.J. van den Hout. 2017. Hacktivism and Website Defacement: Motivations, Capabilities and Potential Threats. In: 27th Virus Bulletin International Conference, Vol. 1, Madrid, Spain, 2017."},{"key":"key-10.1145\/3368926.3369730-3","unstructured":"Wang Wei. Rise in website Defacement attacks by Hackers around the World, https:\/\/thehackernews.com\/2013\/11\/rise-in-website-defacement-attacks-by.html, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-4","unstructured":"Banff Cyber Technologies. Best Practices to address the issue of Web Defacement. Available online: https:\/\/www.banffcyber.com\/knowledge-base\/articles\/best-practices-address-issue-web-defacement\/, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-5","unstructured":"VNCS. VNCS -- Central website monitoring solution, http:\/\/vncs.vn\/portfolio\/giai-phap-giam-sat-websites-tap-trung, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-6","unstructured":"Nagios. Nagios Web Application Monitoring Software, https:\/\/www.nagios.com\/solutions\/web-application-monitoring\/, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-7","unstructured":"Site24x7. Website Defacement Monitoring. https:\/\/www.site24x7.com\/monitor-webpage-defacement.html, last accessed 2019\/08\/10."},{"key":"key-10.1145\/3368926.3369730-8","doi-asserted-by":"crossref","unstructured":"X.D. Hoang. 2018. A Website Defacement Detection Method Based on Machine Learning Techniques. In In SoICT '18: Ninth International Symposium on Information and Communication Technology, December 6-7, 2018, Da Nang City, Viet Nam. ACM, New York, NY, USA, 6 pages. https:\/\/doi.org\/10.1145\/3287921.3287975.","DOI":"10.1145\/3287921.3287975"},{"key":"key-10.1145\/3368926.3369730-9","doi-asserted-by":"crossref","unstructured":"X.D. Hoang, N.T. Nguyen, Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures, Computers 2019, 8, 35; doi:10.3390\/computers8020035.","DOI":"10.3390\/computers8020035"},{"key":"key-10.1145\/3368926.3369730-10","unstructured":"G. Davanzo, E. Medvet and A. Bartoli. 2008. A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. DOI:10.1007\/978-0-387-09699-5_50, In SEC-2008: Proceedings of The IFIP TC 11 23rd International Information Security Conference, pp.711--716."},{"key":"key-10.1145\/3368926.3369730-11","doi-asserted-by":"crossref","unstructured":"G. Davanzo, E. Medvet and A. Bartoli. 2011. Anomaly detection techniques for a web defacement monitoring service. Journal of Expert Systems with Applications, 38 (2011) 12521--12530, doi:10.1016\/j.eswa.2011.04.038, Elsevier.","DOI":"10.1016\/j.eswa.2011.04.038"},{"key":"key-10.1145\/3368926.3369730-12","unstructured":"W. Kim, J. Lee, E. Park, S. Kim. 2006. Advanced Mechanism for Reducing False Alarm Rate in Web Page Defacement Detection. National Security Research Institute, Korea, 2006."},{"key":"key-10.1145\/3368926.3369730-13","unstructured":"E. Medvet, C. Fillonand and A. Bartoli. 2007. Detection of Web Defacements by means of Genetic Programming. In: IAS 2007 -- Manchester, UK, 2007."},{"key":"key-10.1145\/3368926.3369730-14","unstructured":"A. Bartoli, G. Davanzo and E. Medvet. 2010. A Framework for Large-Scale Detection of Web Site Defacements. ACM Transactions on Internet Technology, Vol.10, No.3, Article 10, 2010."},{"key":"key-10.1145\/3368926.3369730-15","unstructured":"K. Borgolte, C. Kruegel and G. Vigna. 2015. Meerkat: Detecting Website Defacements through Image-based Object Recognition. In: Proceedings of the 24th USENIX Security Symposium (USENIX Security), 2015."},{"key":"key-10.1145\/3368926.3369730-16","unstructured":"Defacer.ID. Available online: https:\/\/defacer.id, last accessed 2019\/08\/30."}],"event":{"name":"the Tenth International Symposium","location":"Hanoi, Ha Long Bay, Viet Nam","acronym":"SoICT 2019","number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"start":{"date-parts":[[2019,12,4]]},"end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369730&ftid=2101271&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:05Z","timestamp":1750204385000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369730"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369730","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}