Malicious URL Detection Algorithm based on BM Pattern Matching
In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detect...
Saved in:
| Published in | International Journal of Security and Its Applications Vol. 9; no. 9; pp. 33 - 44 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
30.09.2015
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1738-9976 2207-9629 2092-1497 |
| DOI | 10.14257/ijsia.2015.9.9.04 |
Cover
| Abstract | In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detection method based on BM (Boyer-Moore) pattern matching is proposed. The main research contents and results are as follows: Many malicious URLs could be downloaded by web image search, which may cause unnecessary loses to the users. So the malicious URL detection algorithm based on BM pattern matching is proposed. This method is to let the URL source code match the virus characteristics in the database to confirm whether the URL is safe or not. Web image search detects 203 malicious URLs based on this method. By kaspersky scanning, we confirmed 189 URLs to be malicious URLs, and the error rate is 6.9%, and the accurate rate is 93.1%. The experimental results show that the malicious URL detection algorithm provides secure URLs for web image search engine.. |
|---|---|
| AbstractList | In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detection method based on BM (Boyer-Moore) pattern matching is proposed. The main research contents and results are as follows: Many malicious URLs could be downloaded by web image search, which may cause unnecessary loses to the users. So the malicious URL detection algorithm based on BM pattern matching is proposed. This method is to let the URL source code match the virus characteristics in the database to confirm whether the URL is safe or not. Web image search detects 203 malicious URLs based on this method. By kaspersky scanning, we confirmed 189 URLs to be malicious URLs, and the error rate is 6.9%, and the accurate rate is 93.1%. The experimental results show that the malicious URL detection algorithm provides secure URLs for web image search engine.. |
| Author | Fuqiang Yu |
| Author_xml | – sequence: 1 givenname: Fuqiang surname: Yu fullname: Yu, Fuqiang |
| BookMark | eNqNj81KAzEUhbOoYK19AReSF5iam8nPZCPU-gtTFLHrIZPetpHpTElSpG_v2IprOYsL5_Id-C7IoO1aJOQK2AQEl_rGf0ZvJ5yBnJg-TAzIEHReZMZodU7GMfqaMaGMYZoPye3cNt75bh_p4r2k95jQJd-1dNqsu-DTZktrG3FJ--puTt9sShhaOrfJbXy7viRnK9tEHP_eEVk8PnzMnrPy9ellNi0zx5VMmQGpgEvGlko6NEbZVVEXNQDUlimBUCNoXSwLnqNz_QeNdbLIUSg0mrt8RPLT7r7d2cOXbZpqF_zWhkMFrDqaV0fz6se8Mn2Y6Cl-olzoYgy4-h90fYLQhuRdg38QlwIY5N8n_2t1 |
| ContentType | Journal Article |
| DBID | M1Z AAYXX CITATION ADTOC UNPAY |
| DOI | 10.14257/ijsia.2015.9.9.04 |
| DatabaseName | e-articles CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | 44 |
| ExternalDocumentID | 10.14257/ijsia.2015.9.9.04 10_14257_ijsia_2015_9_9_04 254101 |
| GroupedDBID | ALMA_UNASSIGNED_HOLDINGS KQ8 M1Z .DC AAYXX CITATION ADTOC UNPAY |
| ID | FETCH-LOGICAL-c265t-915612500d65ce996af8b8b111ba064e1be1778d823eccb8be9ac583e46e972c3 |
| IEDL.DBID | UNPAY |
| ISSN | 1738-9976 2207-9629 2092-1497 |
| IngestDate | Tue Aug 19 22:12:18 EDT 2025 Wed Oct 01 04:51:08 EDT 2025 Thu Oct 21 14:35:12 EDT 2021 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Keywords | malicious URL detection BM pattern matching security URLs search engine system web image search engine |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c265t-915612500d65ce996af8b8b111ba064e1be1778d823eccb8be9ac583e46e972c3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.14257/ijsia.2015.9.9.04 |
| PageCount | 12 |
| ParticipantIDs | unpaywall_primary_10_14257_ijsia_2015_9_9_04 crossref_primary_10_14257_ijsia_2015_9_9_04 earticle_primary_254101 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20150930 |
| PublicationDateYYYYMMDD | 2015-09-30 |
| PublicationDate_xml | – month: 09 year: 2015 text: 20150930 day: 30 |
| PublicationDecade | 2010 |
| PublicationTitle | International Journal of Security and Its Applications |
| PublicationYear | 2015 |
| SSID | ssib004699072 ssib004697254 |
| Score | 2.0259035 |
| Snippet | In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search... |
| SourceID | unpaywall crossref earticle |
| SourceType | Open Access Repository Index Database Publisher |
| StartPage | 33 |
| TableOfContents | Abstract
1. Introduction
2. Theoretical Basis
2.1 Related Concepts of Malicious URL
2.2 BM Pattern Matching Algorithm
3. Issues are Raised
3.1 Code Obfuscation
3.2 URL Redirection
3.3. Usage of the Loopholes
4. Method of this Article
4.1 Malicious URL Detection Implementation Process
4.2 BM Pattern Matching Algorithm
4.3 Malicious Codes and Malicious URL Description
4.4 Detect Malicious Web Data Structures
4.5. Detect Malicious Web Algorithm Description
5. Performance Analysis
6. Experimental Results and Analysis
6.1 Experimental Conditions
6.2 Experimental Results
6.3 Analysis of Experimental Results
7. Conclusion
References |
| Title | Malicious URL Detection Algorithm based on BM Pattern Matching |
| URI | http://www.earticle.net/Article.aspx?sn=254101 https://doi.org/10.14257/ijsia.2015.9.9.04 |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library issn: 1738-9976 databaseCode: KQ8 dateStart: 20070101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html omitProxy: true ssIdentifier: ssib004699072 providerName: Colorado Alliance of Research Libraries |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT4NAEN5oe1APPuKrPpo9eFMqr4Xdi0l9NEalqUaSeiKwbLVaadPSGP31zgBtmsZDzZ6AzRJmlplvYOYbQk44YCBbCqZxcN6aDQ5Lixwr1JhU4M2M2JAxFid7TefWt-_arF3Q5GAtzOz_e9xO5933URf5gQxWEzCQ-rPsMMDdJVL2m636S1bxiG-tyDvJ6cLUAPZjnbRp6q4mHFMU1TJ_LzjnkQqNrZGVcTIIv7_CXm_G4zQ28tZFo4yoEBNNPmrjNKrJnzkax8UeZpOsF8CT1vP7bpEllWyTCw9guMQ0WOo_PdBrlWaZWQmt9177w2769knRzcUUTl16tJWRcSbUA_uNX652iN-4eb661YqOCpo0HZaCZcNmmEzXYweUAaFO2OERj8DeRSFgE2VEynBdHnPTAtXCFSVCybilbEcJ15TWLikl_UTtE-qEEGzEJuM679jcRo4aOxIKAIaSAtaukNOJVINBTpwRYMCBcggyOQQoh0DA0O0K2ZsIfjobQlewFxVyNtXDAgsd_G_6IVnFozwB5IiU0uFYHQPKSKMqWb5_5NVik_0CWAvHhg |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kPagHH_iqL_bgTVPz2s3uRaiPUsSUIgbqKSSbrVZrWtoU0V_vTJKWUjwoe0qybMjMZuabZOYbQs4EYCBXSWYIcN6GCw7LiLkTGUxp8GZWYqkEi5P9Nm8F7n2XdUuaHKyFWfx_j9vpsv826SM_kMXqEgZSf1Y5A9xdIdWg3Wk85xWP-NbKopOcKW0DYD_WSdu26RmS27Kslvl9wSWPVGpsnaxO01H09RkNBgsep7lZtC6a5ESFmGjyXp9mcV19L9E4_u1htshGCTxpo7jvNlnR6Q658gGGK0yDpcHjA73VWZ6ZldLG4GU47mevHxTdXELh1LVPOzkZZ0p9sN_45WqXBM27p5uWUXZUMJTNWQaWDZthMtNMOCgDQp2oJ2IRg72LI8Am2oq15XkiEbYDqoUrWkaKCUe7XEvPVs4eqaTDVB8QyiMINhKbCVP0XOEiR40bSw0AQysJa9fI-Uyq4aggzggx4EA5hLkcQpRDKGGYbo3szwQ_nw2hK9iLGrmY6-EPCx3-b_oRWcOjIgHkmFSy8VSfAMrI4tNye_0AsFfGkQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+URL+Detection+Algorithm+based+on+BM+Pattern+Matching&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.au=Fuqiang+Yu&rft.date=2015-09-30&rft.issn=1738-9976&rft.volume=9&rft.issue=9&rft.spage=33&rft.epage=44&rft_id=info:doi/10.14257%2Fijsia.2015.9.9.04&rft.externalDocID=254101 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon |