Exploit Kit Website Detection Using HTTP Proxy Logs
暂无分享,去创建一个
[1] Benjamin Livshits,et al. Kizzle: A Signature Compiler for Detecting Exploit Kits , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Jeanna Neefe Matthews,et al. It's you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[3] Ben Zorn,et al. Kizzle: A Signature Compiler for Exploit Kits , 2017 .
[4] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[5] V. N. Venkatakrishnan,et al. WebWinnow: leveraging exploit kit workflows to detect malicious urls , 2014, CODASPY '14.
[6] References , 1971 .
[7] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[8] Jiyong Jang,et al. Detecting Malicious Exploit Kits using Tree-based Similarity Searches , 2016, CODASPY.
[9] Fabio Massacci,et al. Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts , 2013, ESSoS.
[10] Elizabeth Smither,et al. The Blue Coat , 2013 .