• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ±×·¡ÇÁ ±â¹ÝÀÇ ÇÇ½Ì URL ŽÁö
¿µ¹®Á¦¸ñ(English Title) Graph-Based Phishing URL Detection
ÀúÀÚ(Author) ±èŸ®   È«Áö¿ø   ¹Ú³ë¼º   ±è»ó¿í   Taeri Kim   Jiwon Hong   Noseong Park   Sang-Wook Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 26 NO. 03 PP. 0156 ~ 0160 (2020. 03)
Çѱ۳»¿ë
(Korean Abstract)
ÇǽÌÀ» ÅëÇÑ »çÀ̹ö ¹üÁË°¡ ´Ã¾î³ª°í ÀÖ´Ù. ÇǽÌÀÌ ÃÊ·¡ÇÏ´Â ÇÇÇظ¦ ¹æÁöÇϱâ À§ÇØ ÄÜÅÙÃ÷ ±â¹Ý, URL ¹®ÀÚ¿­ ±â¹Ý µî ¸¹Àº ÇÇ½Ì URL °ü·Ã ¿¬±¸µéÀÌ ÁøÇàµÇ¾î ¿Ô´Ù. ÄÜÅÙÃ÷ ±â¹Ý ¹æ¹ýÀº À¥ ÆäÀÌÁö ÄÜÅÙÃ÷¸¦ ´Ù¿î·ÎµåÇÏ°í ºÐ¼®ÇÏ´Â ¹æ¹ýÀ¸·Î, º¸¾È»ó À§ÇèÀÌ µû¸£´Â ´ÜÁ¡ÀÌ Á¸ÀçÇÑ´Ù. URL ¹®ÀÚ¿­ ±â¹Ý ¹æ¹ýÀº URL ¹®ÀÚ¿­ ÆÐÅÏÀ» ºÐ¼®ÇÏ°í À̸¦ ÇÇ½Ì URL ŽÁö¿¡ »ç¿ëÇÑ´Ù. º» ³í¹®¿¡¼­´Â ±âÁ¸ ¿¬±¸·ÎºÎÅÍ È®ÀÎµÈ ÇÇ½Ì URLÀÇ °æÇâ¿¡¼­ Âø¾ÈÇÏ¿©, URL ¹®ÀÚ¿­À» ±×·¡ÇÁ·Î ±¸ÃàÇÏ°í Random Walk with Restart, Belief Propagation°ú °°Àº ±×·¡ÇÁ Ãß·Ð ¾Ë°í¸®Áò°ú DeepWalk, Node2vec°ú °°Àº ±×·¡ÇÁ ÀÓº£µù ±â¹ýÀ» ÅëÇØ URLÀÇ ÇÇ½Ì ¿©ºÎ¸¦ ¿¹ÃøÇÑ´Ù. ¿ì¸®ÀÇ ±×·¡ÇÁ ±â¹Ý ÇÇ½Ì URL ŽÁö ¹æ¹ý°ú ºÐ·ù ¾Ë°í¸®ÁòÀ» È°¿ëÇÑ ±âÁ¸ ÇÇ½Ì URL ŽÁö ¹æ¹ýÀ» ºñ±³ÇÑ °á°ú, ±×·¡ÇÁ ±â¹Ý ¹æ¹ýÀÌ ¸ðµç Á¤È®µµ ôµµ¿¡¼­ ´õ ³ôÀº ¼º´ÉÀ» º¸¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Cyber crime through phishing is on the rise. To prevent the damage caused by phishing attacks, many studies to detect phishing URLs such as content-based and string-based have been conducted. A content-based method is a method of downloading and analyzing web page content, which poses a security risk. The string-based method analyzes URL string patterns and uses them for phishing URL detection. In this paper, we construct a graph with URL strings based on the phishing URL trends identified from previous studies. And, we detect phishing URLs through the graph-based inference algorithms such as Random Walk with Restart, Belief Propagation, and graph embedding methods such as DeepWalk, Node2vec. As a result of comparing our graph-based phishing URL detection method with the conventional phishing URL detection methods, our method shows better prediction performance in all accuracy measures.
Å°¿öµå(Keyword) URL ¹®ÀÚ¿­   ÇÇ½Ì URL ŽÁö   ±×·¡ÇÁ Ã߷Р  ±×·¡ÇÁ ÀÓº£µù   ºÐ·ù   URL string   phishing URL detection   graph-based inference   graph embedding   classification  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå