Detecção de Desfiguração de Sites por Similaridade em Imagens
Resumo
Esse trabalho propõe uma nova abordagem de detecção de desfiguração de páginas web, baseada na análise de imagens, identificando a simetria entre o estado inicial da página web e o estado atual. Esse trabalho difere dos demais, devido à sua simplicidade, mantendo a eficácia.Referências
Borgolte, K., Kruegel, C.; Vigna, G. Meerkat: “Detecting Website Defacements through Image-based Object Recognition”. In: USENIX Security Symposium. 2015. p. 595- 610.
Davanzo, G., Medvet, E., Bartoli, A (2011). “Anomaly detection techniques for a web defacement monitoring servisse”. Expert Systems with Applications, v. 38, n. 10, p. 12521-12530.
Gurjwar, K.R., Sahu, D.R., Tomar, D.S. (2013). “An approach to reveal website defacement”. International Journal of Computer Science and Information Security, v. 11, n. 6, p. 73.
Kanti, T., Richariya, V., Richariya, V. (2011). “Implementing a Web browser with Web defacement detection techniques”. World of Computer Science and Information Technology Journal (WCSIT), v. 1, n. 7, p. 307-310.
Oriyano, J.M. (2014). CEH v8: Certified Ethical Hacker Version 8 Study Guide. Wiley & Sons, USA.
Philippe, H., Lauren, W. (2017). “What is the Document Object Model?”, https://www.w3.org/TR/DOM-Level-2-Core/introduction.html.
Verma, R.K.; Sayyad, S. (2015). “Implementation of Web Defacement Detection”. International Journal of Innovations in Engineering and Technology (IJIET), v.6, p. 134-141.
Davanzo, G., Medvet, E., Bartoli, A (2011). “Anomaly detection techniques for a web defacement monitoring servisse”. Expert Systems with Applications, v. 38, n. 10, p. 12521-12530.
Gurjwar, K.R., Sahu, D.R., Tomar, D.S. (2013). “An approach to reveal website defacement”. International Journal of Computer Science and Information Security, v. 11, n. 6, p. 73.
Kanti, T., Richariya, V., Richariya, V. (2011). “Implementing a Web browser with Web defacement detection techniques”. World of Computer Science and Information Technology Journal (WCSIT), v. 1, n. 7, p. 307-310.
Oriyano, J.M. (2014). CEH v8: Certified Ethical Hacker Version 8 Study Guide. Wiley & Sons, USA.
Philippe, H., Lauren, W. (2017). “What is the Document Object Model?”, https://www.w3.org/TR/DOM-Level-2-Core/introduction.html.
Verma, R.K.; Sayyad, S. (2015). “Implementation of Web Defacement Detection”. International Journal of Innovations in Engineering and Technology (IJIET), v.6, p. 134-141.
Publicado
06/11/2017
Como Citar
JESUS, Henry Mendes de; BRANDÃO, José Eduardo Malta de Sá.
Detecção de Desfiguração de Sites por Similaridade em Imagens. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 17. , 2017, Brasília.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2017
.
p. 487-493.
DOI: https://doi.org/10.5753/sbseg.2017.19522.