bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

Preprint English OPEN
Gupta, Neha; Aggarwal, Anupama; Kumaraguru, Ponnurangam;
(2014)
  • Subject: Computer Science - Cryptography and Security

Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained a lot of tracti... View more
  • References (24)
    24 references, page 1 of 3

    [1] A. Neumann, J. Barnickel, U. Meyer. Security and Privacy Implications of URL Shortening Services. In proceedings of Web 2.0 Security and Privacy (W2SP) (2011).

    [2] F. Klien, M. Strohmaier. Short Links Under Attack: Geographical Analysis of Spam in a URL Shortener Network. In proceedings of the 23rd ACM conference on Hypertext and social media (2012), Pages 83-88.

    [3] D. Antoniades, I. Polakis, G. Kontaxis. we.b: The web of short URLs. In proceedings of the 20th international conference on World wide web (2011), Pages 715-724.

    [4] F. Maggi, A. Frossi, S. Zanero, G. Stringhini, B. Stone-Gross, C. Kruegel, G. Vigna. Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures. In proceedings of the 22nd international conference on World Wide Web (2013), Pages 861-872.

    [5] V. Kandylas and A. Dasdan. The Utility of Tweeted URLs for Web Search. In proceedings of the 19th international conference on World wide web (2010), Pages 1127-1128.

    [6] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-Time URL Spam Filtering Service. Security and Privacy (SP) IEEE Symposium (2011), Pages 447 - 462.

    [7] H. Gao, J. Hu, and C. Wilson. Detecting and Characterizing Social Spam Campaigns. In proceedings of the 10th ACM SIGCOMM conference on Internet measurement (2010), Pages 35-47.

    [8] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting Spammers on Twitter. In Collaboration, Electronic messaging, AntiAbuse and Spam Conference (CEAS) (2010).

    [9] A. Aggarwal, A. Rajadesingan, and P. Kumaraguru. PhishAri: Automatic Realtime Phishing Detection on Twitter. In Seventh IEEE APWG eCrime researchers summit (eCRS) (2012). Master's thesis, IIIT-Delhi (2012).

    [10] C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The Underground on 140 Characters or Less. In proceedings of the 17th ACM conference on Computer and communications security (2010), Pages 27- 37.

  • Metrics
Share - Bookmark