https://scholars.lib.ntu.edu.tw/handle/123456789/625907
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Umizaki, Mitsuhiro | en_US |
dc.contributor.author | Morikawa, Tomohiro | en_US |
dc.contributor.author | Fujita, Akira | en_US |
dc.contributor.author | Takahashi, Takeshi | en_US |
dc.contributor.author | TSUNG-NAN LIN | en_US |
dc.contributor.author | Inoue, Daisuke | en_US |
dc.date.accessioned | 2022-12-08T05:56:15Z | - |
dc.date.available | 2022-12-08T05:56:15Z | - |
dc.date.issued | 2022-01-01 | - |
dc.identifier.isbn | 9781665497923 | - |
dc.identifier.issn | 15301346 | - |
dc.identifier.uri | https://scholars.lib.ntu.edu.tw/handle/123456789/625907 | - |
dc.description.abstract | Websites can spread malware and phishing scams, and this represents a significant risk to users. To block such malicious websites, various organizations and individuals, e.g., security vendors, analyze URLs and create blocklists. Some blocklists are paid and some are free public blocklists; however, the effectiveness of public blocklists is generally not guaranteed. Thus, many studies have attempted to verify their effectiveness. To the best of our knowledge, public blocklist providers (PBP) have not been studied as rigorously as blocklists, and it is still unclear how blocklists should be operated and how PBP websites should be designed to maintain the effectiveness. Therefore, to unveil more characteristics of the PBP, we designed a measurement study to analyze PBPs in terms of lifespan, update frequency, entry bias, and user interface metrics. In this paper, we describe the results of measuring seven PBPs according to these four metrics. | en_US |
dc.relation.ispartof | Proceedings - IEEE Symposium on Computers and Communications | en_US |
dc.subject | Metrics/Measurement | Network monitoring | Security and Protection | Services Operation | User Interfaces | Web-based services | en_US |
dc.title | Understanding the Characteristics of Public Blocklist Providers | en_US |
dc.type | conference paper | en_US |
dc.identifier.doi | 10.1109/ISCC55528.2022.9913009 | - |
dc.identifier.scopus | 2-s2.0-85141168205 | - |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/85141168205 | - |
dc.relation.journalvolume | 2022-June | en_US |
dc.relation.pageend | 07 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.fulltext | no fulltext | - |
crisitem.author.dept | Electrical Engineering | - |
crisitem.author.dept | Communication Engineering | - |
crisitem.author.orcid | 0000-0001-5659-1194 | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。