Identifying equivalent urls using url signatures
LK Soon, SH Lee - … on Signal Image Technology and Internet …, 2008 - ieeexplore.ieee.org
… Owing to the relatively small dataset, we verify the identified equivalent URLs manually in this
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …
[PDF][PDF] Identifying Equivalent URLs using URL Signatures
LKSSH Lee - researchgate.net
… Owing to the relatively small dataset, we verify the identified equivalent URLs manually in this
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …
paper. To evaluate the effectiveness of our URL signatures… [5], which is URL reduction rate: …
Reducing redundantweb crawling using url signatures
… The redundant web pages linked by these 170 equivalent URLs are identified by our URL
signatures as well. The default web pages considered in Lee et al.’s proposed method are …
signatures as well. The default web pages considered in Lee et al.’s proposed method are …
Spamming botnets: signatures and characteristics
… URL signature generation problem is in many ways similar to … for automatically generating
URL signatures to identify botnet-… URLs are discarded from the pool of remaining URL groups …
URL signatures to identify botnet-… URLs are discarded from the pool of remaining URL groups …
An effective detection approach for phishing websites using URL and HTML features
… makes websites that look very similar to the benign websites. … Also, these services inaccurately
identify the new benign website … website with the pre-stored signature of the website. The …
identify the new benign website … website with the pre-stored signature of the website. The …
Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation
AS Rafsanjani, NB Kamaruddin, M Behjati… - IEEE …, 2024 - ieeexplore.ieee.org
… malicious URL detection method to accurately identify URLs … a signature, the detection
systems may examine URLs for … of websites that are detected the URL, and the result is equal …
systems may examine URLs for … of websites that are detected the URL, and the result is equal …
Web Crawler with URL signature—a performance study
LK Soon, YE Ku, SH Lee - … 4th Conference on Data Mining and …, 2012 - ieeexplore.ieee.org
… use MD5 hashing function to generate our URL signatures because it is sensitive to even a
small change. Some may think that it is a disadvantage of using … to identify equivalent URLs …
small change. Some may think that it is a disadvantage of using … to identify equivalent URLs …
A framework for detection and measurement of phishing attacks
… (such as signing up to a … To identify this category of URLs we determine the number of
characters present after an organization in the hostname. We obtain the URL’s hostname and use …
characters present after an organization in the hostname. We obtain the URL’s hostname and use …
Phishing detection: analysis of visual similarity based approaches
AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
… very useful for detecting phishing websites efficiently. Phishing website looks very similar in
… (2) Visual similarity based techniques use a signature to identify phishing webpages. The …
… (2) Visual similarity based techniques use a signature to identify phishing webpages. The …
URL Signatures for Improving URL Normalization
LK Soon, SH Lee - Journal of KIISE: Databases, 2009 - koreascience.kr
… be equivalent in our scheme. The results in the second experiment show that our proposed
URL signatures were able to further reduce redundant URLs … the identified equivalent URLS …
URL signatures were able to further reduce redundant URLs … the identified equivalent URLS …