Detecção de Desfiguração de Sites por Similaridade em Imagens
Abstract
This paper proposes a new approach for web page defacement detection. It’s based on image analysis, identifying the symmetry between the initial state of the web page and the current state. This work differs from the others, due to its simplicity, maintaining effectiveness.References
Borgolte, K., Kruegel, C.; Vigna, G. Meerkat: “Detecting Website Defacements through Image-based Object Recognition”. In: USENIX Security Symposium. 2015. p. 595- 610.
Davanzo, G., Medvet, E., Bartoli, A (2011). “Anomaly detection techniques for a web defacement monitoring servisse”. Expert Systems with Applications, v. 38, n. 10, p. 12521-12530.
Gurjwar, K.R., Sahu, D.R., Tomar, D.S. (2013). “An approach to reveal website defacement”. International Journal of Computer Science and Information Security, v. 11, n. 6, p. 73.
Kanti, T., Richariya, V., Richariya, V. (2011). “Implementing a Web browser with Web defacement detection techniques”. World of Computer Science and Information Technology Journal (WCSIT), v. 1, n. 7, p. 307-310.
Oriyano, J.M. (2014). CEH v8: Certified Ethical Hacker Version 8 Study Guide. Wiley & Sons, USA.
Philippe, H., Lauren, W. (2017). “What is the Document Object Model?”, https://www.w3.org/TR/DOM-Level-2-Core/introduction.html.
Verma, R.K.; Sayyad, S. (2015). “Implementation of Web Defacement Detection”. International Journal of Innovations in Engineering and Technology (IJIET), v.6, p. 134-141.
Davanzo, G., Medvet, E., Bartoli, A (2011). “Anomaly detection techniques for a web defacement monitoring servisse”. Expert Systems with Applications, v. 38, n. 10, p. 12521-12530.
Gurjwar, K.R., Sahu, D.R., Tomar, D.S. (2013). “An approach to reveal website defacement”. International Journal of Computer Science and Information Security, v. 11, n. 6, p. 73.
Kanti, T., Richariya, V., Richariya, V. (2011). “Implementing a Web browser with Web defacement detection techniques”. World of Computer Science and Information Technology Journal (WCSIT), v. 1, n. 7, p. 307-310.
Oriyano, J.M. (2014). CEH v8: Certified Ethical Hacker Version 8 Study Guide. Wiley & Sons, USA.
Philippe, H., Lauren, W. (2017). “What is the Document Object Model?”, https://www.w3.org/TR/DOM-Level-2-Core/introduction.html.
Verma, R.K.; Sayyad, S. (2015). “Implementation of Web Defacement Detection”. International Journal of Innovations in Engineering and Technology (IJIET), v.6, p. 134-141.
Published
2017-11-06
How to Cite
JESUS, Henry Mendes de; BRANDÃO, José Eduardo Malta de Sá.
Detecção de Desfiguração de Sites por Similaridade em Imagens. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 17. , 2017, Brasília.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2017
.
p. 487-493.
DOI: https://doi.org/10.5753/sbseg.2017.19522.
