Malicious URL Detection Algorithm based on BM Pattern Matching

In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detect...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Security and Its Applications Vol. 9; no. 9; pp. 33 - 44
Main Author Yu, Fuqiang
Format Journal Article
LanguageEnglish
Published 30.09.2015
Subjects
Online AccessGet full text
ISSN1738-9976
2207-9629
2092-1497
DOI10.14257/ijsia.2015.9.9.04

Cover

Abstract In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detection method based on BM (Boyer-Moore) pattern matching is proposed. The main research contents and results are as follows: Many malicious URLs could be downloaded by web image search, which may cause unnecessary loses to the users. So the malicious URL detection algorithm based on BM pattern matching is proposed. This method is to let the URL source code match the virus characteristics in the database to confirm whether the URL is safe or not. Web image search detects 203 malicious URLs based on this method. By kaspersky scanning, we confirmed 189 URLs to be malicious URLs, and the error rate is 6.9%, and the accurate rate is 93.1%. The experimental results show that the malicious URL detection algorithm provides secure URLs for web image search engine..
AbstractList In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search engine based on the research of content-based image search engine system V2.0 is developed. A malicious URL (Uniform Resource Locator) detection method based on BM (Boyer-Moore) pattern matching is proposed. The main research contents and results are as follows: Many malicious URLs could be downloaded by web image search, which may cause unnecessary loses to the users. So the malicious URL detection algorithm based on BM pattern matching is proposed. This method is to let the URL source code match the virus characteristics in the database to confirm whether the URL is safe or not. Web image search detects 203 malicious URLs based on this method. By kaspersky scanning, we confirmed 189 URLs to be malicious URLs, and the error rate is 6.9%, and the accurate rate is 93.1%. The experimental results show that the malicious URL detection algorithm provides secure URLs for web image search engine..
Author Fuqiang Yu
Author_xml – sequence: 1
  givenname: Fuqiang
  surname: Yu
  fullname: Yu, Fuqiang
BookMark eNqNj81KAzEUhbOoYK19AReSF5iam8nPZCPU-gtTFLHrIZPetpHpTElSpG_v2IprOYsL5_Id-C7IoO1aJOQK2AQEl_rGf0ZvJ5yBnJg-TAzIEHReZMZodU7GMfqaMaGMYZoPye3cNt75bh_p4r2k95jQJd-1dNqsu-DTZktrG3FJ--puTt9sShhaOrfJbXy7viRnK9tEHP_eEVk8PnzMnrPy9ellNi0zx5VMmQGpgEvGlko6NEbZVVEXNQDUlimBUCNoXSwLnqNz_QeNdbLIUSg0mrt8RPLT7r7d2cOXbZpqF_zWhkMFrDqaV0fz6se8Mn2Y6Cl-olzoYgy4-h90fYLQhuRdg38QlwIY5N8n_2t1
ContentType Journal Article
DBID M1Z
AAYXX
CITATION
ADTOC
UNPAY
DOI 10.14257/ijsia.2015.9.9.04
DatabaseName e-articles
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
EndPage 44
ExternalDocumentID 10.14257/ijsia.2015.9.9.04
10_14257_ijsia_2015_9_9_04
254101
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
KQ8
M1Z
.DC
AAYXX
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c265t-915612500d65ce996af8b8b111ba064e1be1778d823eccb8be9ac583e46e972c3
IEDL.DBID UNPAY
ISSN 1738-9976
2207-9629
2092-1497
IngestDate Tue Aug 19 22:12:18 EDT 2025
Wed Oct 01 04:51:08 EDT 2025
Thu Oct 21 14:35:12 EDT 2021
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 9
Keywords malicious URL detection
BM pattern matching
security URLs
search engine system
web image search engine
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c265t-915612500d65ce996af8b8b111ba064e1be1778d823eccb8be9ac583e46e972c3
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.14257/ijsia.2015.9.9.04
PageCount 12
ParticipantIDs unpaywall_primary_10_14257_ijsia_2015_9_9_04
crossref_primary_10_14257_ijsia_2015_9_9_04
earticle_primary_254101
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20150930
PublicationDateYYYYMMDD 2015-09-30
PublicationDate_xml – month: 09
  year: 2015
  text: 20150930
  day: 30
PublicationDecade 2010
PublicationTitle International Journal of Security and Its Applications
PublicationYear 2015
SSID ssib004699072
ssib004697254
Score 2.0259035
Snippet In the virus world of Internet, it is a challenging and urgent problem that how can we ensure the safety of search engines. A security subsystem of the search...
SourceID unpaywall
crossref
earticle
SourceType Open Access Repository
Index Database
Publisher
StartPage 33
TableOfContents Abstract 1. Introduction 2. Theoretical Basis 2.1 Related Concepts of Malicious URL 2.2 BM Pattern Matching Algorithm 3. Issues are Raised 3.1 Code Obfuscation 3.2 URL Redirection 3.3. Usage of the Loopholes 4. Method of this Article 4.1 Malicious URL Detection Implementation Process 4.2 BM Pattern Matching Algorithm 4.3 Malicious Codes and Malicious URL Description 4.4 Detect Malicious Web Data Structures 4.5. Detect Malicious Web Algorithm Description 5. Performance Analysis 6. Experimental Results and Analysis 6.1 Experimental Conditions 6.2 Experimental Results 6.3 Analysis of Experimental Results 7. Conclusion References
Title Malicious URL Detection Algorithm based on BM Pattern Matching
URI http://www.earticle.net/Article.aspx?sn=254101
https://doi.org/10.14257/ijsia.2015.9.9.04
UnpaywallVersion publishedVersion
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  issn: 1738-9976
  databaseCode: KQ8
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  omitProxy: true
  ssIdentifier: ssib004699072
  providerName: Colorado Alliance of Research Libraries
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT4NAEN5oe1APPuKrPpo9eFMqr4Xdi0l9NEalqUaSeiKwbLVaadPSGP31zgBtmsZDzZ6AzRJmlplvYOYbQk44YCBbCqZxcN6aDQ5Lixwr1JhU4M2M2JAxFid7TefWt-_arF3Q5GAtzOz_e9xO5933URf5gQxWEzCQ-rPsMMDdJVL2m636S1bxiG-tyDvJ6cLUAPZjnbRp6q4mHFMU1TJ_LzjnkQqNrZGVcTIIv7_CXm_G4zQ28tZFo4yoEBNNPmrjNKrJnzkax8UeZpOsF8CT1vP7bpEllWyTCw9guMQ0WOo_PdBrlWaZWQmt9177w2769knRzcUUTl16tJWRcSbUA_uNX652iN-4eb661YqOCpo0HZaCZcNmmEzXYweUAaFO2OERj8DeRSFgE2VEynBdHnPTAtXCFSVCybilbEcJ15TWLikl_UTtE-qEEGzEJuM679jcRo4aOxIKAIaSAtaukNOJVINBTpwRYMCBcggyOQQoh0DA0O0K2ZsIfjobQlewFxVyNtXDAgsd_G_6IVnFozwB5IiU0uFYHQPKSKMqWb5_5NVik_0CWAvHhg
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kPagHH_iqL_bgTVPz2s3uRaiPUsSUIgbqKSSbrVZrWtoU0V_vTJKWUjwoe0qybMjMZuabZOYbQs4EYCBXSWYIcN6GCw7LiLkTGUxp8GZWYqkEi5P9Nm8F7n2XdUuaHKyFWfx_j9vpsv826SM_kMXqEgZSf1Y5A9xdIdWg3Wk85xWP-NbKopOcKW0DYD_WSdu26RmS27Kslvl9wSWPVGpsnaxO01H09RkNBgsep7lZtC6a5ESFmGjyXp9mcV19L9E4_u1htshGCTxpo7jvNlnR6Q658gGGK0yDpcHjA73VWZ6ZldLG4GU47mevHxTdXELh1LVPOzkZZ0p9sN_45WqXBM27p5uWUXZUMJTNWQaWDZthMtNMOCgDQp2oJ2IRg72LI8Am2oq15XkiEbYDqoUrWkaKCUe7XEvPVs4eqaTDVB8QyiMINhKbCVP0XOEiR40bSw0AQysJa9fI-Uyq4aggzggx4EA5hLkcQpRDKGGYbo3szwQ_nw2hK9iLGrmY6-EPCx3-b_oRWcOjIgHkmFSy8VSfAMrI4tNye_0AsFfGkQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+URL+Detection+Algorithm+based+on+BM+Pattern+Matching&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.au=Fuqiang+Yu&rft.date=2015-09-30&rft.issn=1738-9976&rft.volume=9&rft.issue=9&rft.spage=33&rft.epage=44&rft_id=info:doi/10.14257%2Fijsia.2015.9.9.04&rft.externalDocID=254101
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon