Identifying equivalent urls using url signatures

LK Soon, SH Lee - … on Signal Image Technology and Internet …, 2008 - ieeexplore.ieee.org
… Owing to the relatively small dataset, we verify the identified equivalent URLs manually in this
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …

[PDF][PDF] Identifying Equivalent URLs using URL Signatures

LKSSH Lee - researchgate.net
… Owing to the relatively small dataset, we verify the identified equivalent URLs manually in this
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …

Reducing redundantweb crawling using url signatures

A Gabillon, QZ Sheng, W Mansoor, LK Soon… - Web-Based Information …, 2010 - Springer
… The redundant web pages linked by these 170 equivalent URLs are identified by our URL
signatures as well. The default web pages considered in Lee et al.’s proposed method are …

Spamming botnets: signatures and characteristics

Y Xie, F Yu, K Achan, R Panigrahy, G Hulten… - ACM SIGCOMM …, 2008 - dl.acm.org
URL signature generation problem is in many ways similar to … for automatically generating
URL signatures to identify botnet-… URLs are discarded from the pool of remaining URL groups …

An effective detection approach for phishing websites using URL and HTML features

A Aljofey, Q Jiang, A Rasool, H Chen, W Liu, Q Qu… - Scientific Reports, 2022 - nature.com
… makes websites that look very similar to the benign websites. … Also, these services inaccurately
identify the new benign websitewebsite with the pre-stored signature of the website. The …

Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation

AS Rafsanjani, NB Kamaruddin, M Behjati… - IEEE …, 2024 - ieeexplore.ieee.org
… malicious URL detection method to accurately identify URLs … a signature, the detection
systems may examine URLs for … of websites that are detected the URL, and the result is equal

Web Crawler with URL signature—a performance study

LK Soon, YE Ku, SH Lee - … 4th Conference on Data Mining and …, 2012 - ieeexplore.ieee.org
use MD5 hashing function to generate our URL signatures because it is sensitive to even a
small change. Some may think that it is a disadvantage of using … to identify equivalent URLs

A framework for detection and measurement of phishing attacks

S Garera, N Provos, M Chew, AD Rubin - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
… (such as signing up to a … To identify this category of URLs we determine the number of
characters present after an organization in the hostname. We obtain the URL’s hostname and use

Phishing detection: analysis of visual similarity based approaches

AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
… very useful for detecting phishing websites efficiently. Phishing website looks very similar in
… (2) Visual similarity based techniques use a signature to identify phishing webpages. The …

URL Signatures for Improving URL Normalization

LK Soon, SH Lee - Journal of KIISE: Databases, 2009 - koreascience.kr
… be equivalent in our scheme. The results in the second experiment show that our proposed
URL signatures were able to further reduce redundant URLs … the identified equivalent URLS