• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 9
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 29
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Malicious Web Page Detection Based on Anomaly Semantics

Luo, Jing-Siang 20 August 2009 (has links)
Web services are becoming the dominant way to provide access to on-line information. Web services have a lot of applications, like e-mail, web search engine, auction network and internet banking. On the web services, web application technology and dynamic webpage technology are very important, but hackers take advantage of web application vulnerabilities and dynamic webpage technology to inject malicious codes into webpages. However, a part of the web sites have neglected the issue of security. In this paper, we propose a novel approach for detecting malicious webpages by URL features, anomaly semantics, potential dangerous tags and tag attributes. This research proposed approach mainly consists of three parts: (1) scripting language and automatic link filter. (2) malicious feature. (3) scoring mechanism. By first part, this step can filter out normal webpages to increae detection speed. Second part can identify some known malicious attacks. Third part can search some unknown malicious webpages by scoring. Our experimental results show that the proposed approach achieves low false positive rate and low false negative rate.
2

Detecting Visually Similar Web Pages: Application to Phishing Detection

Teh-Chung, Chen 06 1900 (has links)
We propose a novel approach for detecting visual similarity between two web pages. The proposed approach applies Gestalt theory and considers a webpage as a single indivisible entity. The concept of supersignals, as a realization of Gestalt principles, supports our contention that web pages must be treated as indivisible entities. We objectify, and directly compare, these indivisible supersignals using algorithmic complexity theory. We apply our new approach to the domain of anti-Phishing technologies, which at once gives us both a reasonable ground truth for the concept of “visually similar,” and a high-value application of our proposed approach. Phishing attacks involve sophisticated, fraudulent websites that are realistic enough to fool a significant number of victims into providing their account credentials. There is a constant tug-of-war between anti-Phishing researchers who create new schemes to detect Phishing scams, and Phishers who create countermeasures. Our approach to Phishing detection is based on one major signature of Phishing webpage which can not be easily changed by those con artists –Visual Similarity. The only way to fool this significant characteristic appears to be to make a visually dissimilar Phishing webpage, which also reduces the successful rate of the Phishing scams or their criminal profits dramatically. For this reason, our application appears to be quite robust against a variety of common countermeasures Phishers have employed. To verify the practicality of our proposed method, we perform a large-scale, real-world case study, based on “live” Phish captured from the Internet. Compression algorithms (as a practical operational realization of algorithmic complexity theory) are a critical component of our approach. Out of the vast number of compression techniques in the literature, we must determine which compression technique is best suited for our visual similarity problem. We therefore perform a comparison of nine compressors (including both 1-dimensional string compressors and 2-dimensional image compressors). We finally determine that the LZMA algorithm performs best for our problem. With this determination made, we test the LZMA-based similarity technique in a realistic anti-Phishing scenario. We construct a whitelist of protected sites, and compare the performance of our similarity technique when presented with a) some of the most popular legitimate sites, and b) live Phishing sites targeting the protected sites. We found that the accuracy of our technique is extremely high in this test; the true positive and false positive rates reached 100% and 0.8%, respectively. We finally undertake a more detailed investigation of the LZMA compression technique. Other authors have argued that compression techniques map objects to an implicit feature space consisting of the dictionary elements generated by the compressor. In testing this possibility on live Phishing data, we found that derived variables computed directly from the dictionary elements were indeed excellent predictors. In fact, by taking advantage of the specific characteristic of dictionary compression algorithm, we slightly improve on our accuracy when using a modified/refined LZMA algorithm for our already perfect NCD classification application. / Software Engineering and Intelligent Systems
3

Detecting Visually Similar Web Pages: Application to Phishing Detection

Teh-Chung, Chen Unknown Date
No description available.
4

Beyond usability -- affect in web browsing

Deng, Liqiong 02 June 2009 (has links)
This research concentrates on the visual aesthetics of a website, investigating the web user's affective/emotional reactions to different designs of web homepage aesthetics and their influence on subsequent behaviors of web users. Drawing on the existing theories and empirical findings in environmental psychology, human-computer interaction, aesthetics, and marketing research literature, a research model is developed to explore the relationships between the visual aesthetic qualities of a website homepage - webpage visual complexity and order, induced emotional states in users, and users' approach behaviors toward the website. The model predicts that the visual aesthetics of a web homepage elicit specific emotional responses by provoking intrinsic feelings of pleasantness / unpleasantness, arousal, as well as motivational pleasantness / unpleasantness in web users. These elicited emotional responses, which mediate the effect of homepage aesthetic features, in turn affect web users' subsequent behaviors toward the website, such as further approaching/exploring or avoiding the website. A set of pilot studies and a main laboratory experiment were conducted to test the model and its associated hypotheses. Based on the results of pilot studies, 12 versions of a Gift website's homepage, which varied at four levels of complexity and three levels of order, were selected the stimuli materials for the main experiment. A total of 467 undergraduate students participated in the main study. During the main study, we instructed the participants to browse the homepage stimuli for a goal-oriented web search activity or an excitement/enjoyment-seeking web browsing activity, measured how they felt about the homepage and their degree of approach/avoidance tendencies toward the entire website. The results of the study generally confirmed the belief that a web user's initial emotional responses (i.e., pleasantness and arousal) evoked by the aesthetic qualities of a website's homepage he/she first encounters will have carry-over effects on his/her subsequent approach behaviors toward the website.
5

Beyond usability -- affect in web browsing

Deng, Liqiong 02 June 2009 (has links)
This research concentrates on the visual aesthetics of a website, investigating the web user's affective/emotional reactions to different designs of web homepage aesthetics and their influence on subsequent behaviors of web users. Drawing on the existing theories and empirical findings in environmental psychology, human-computer interaction, aesthetics, and marketing research literature, a research model is developed to explore the relationships between the visual aesthetic qualities of a website homepage - webpage visual complexity and order, induced emotional states in users, and users' approach behaviors toward the website. The model predicts that the visual aesthetics of a web homepage elicit specific emotional responses by provoking intrinsic feelings of pleasantness / unpleasantness, arousal, as well as motivational pleasantness / unpleasantness in web users. These elicited emotional responses, which mediate the effect of homepage aesthetic features, in turn affect web users' subsequent behaviors toward the website, such as further approaching/exploring or avoiding the website. A set of pilot studies and a main laboratory experiment were conducted to test the model and its associated hypotheses. Based on the results of pilot studies, 12 versions of a Gift website's homepage, which varied at four levels of complexity and three levels of order, were selected the stimuli materials for the main experiment. A total of 467 undergraduate students participated in the main study. During the main study, we instructed the participants to browse the homepage stimuli for a goal-oriented web search activity or an excitement/enjoyment-seeking web browsing activity, measured how they felt about the homepage and their degree of approach/avoidance tendencies toward the entire website. The results of the study generally confirmed the belief that a web user's initial emotional responses (i.e., pleasantness and arousal) evoked by the aesthetic qualities of a website's homepage he/she first encounters will have carry-over effects on his/her subsequent approach behaviors toward the website.
6

Discovering web page communities for web-based data management

Hou, Jingyu January 2002 (has links)
The World Wide Web is a rich source of information and continues to expand in size and complexity. Mainly because the data on the web is lack of rigid and uniform data models or schemas, how to effectively and efficiently manage web data and retrieve information is becoming a challenge problem. Discovering web page communities, which capture the features of the web and web-based data to find intrinsic relationships among the data, is one of the effective ways to solve this problem. A web page community is a set of web pages that has its own logical and semantic structures. In this work, we concentrate on the web data in web page format and exploit hyperlink information to discover (construct) web page communities. Three main web page communities are studied in this work: the first one is consisted of hub and authority pages, the second one is composed of relevant web pages with respect to a given page (URL), and the last one is the community with hierarchical cluster structures. For analysing hyperlinks, we establish a mathematical framework, especially the matrix-based framework, to model hyperlinks. Within this mathematical framework, hyperlink analysis is placed on a solid mathematic base and the results are reliable. For the web page community that is consisted of hub and authority pages, we focus on eliminating noise pages from the concerned page source to obtain another good quality page source, and in turn improve the quality of web page communities. We propose an innovative noise page elimination algorithm based on the hyperlink matrix model and mathematic operations, especially the singular value decomposition (SVD) of matrix. The proposed algorithm exploits hyperlink information among the web pages, reveals page relationships at a deeper level, and numerically defines thresholds for noise page elimination. The experiment results show the effectiveness and feasibility of the algorithm. This algorithm could also be used solely for web-based data management systems to filter unnecessary web pages and reduce the management cost. In order to construct a web page community that is consisted of relevant pages with respect to a given page (URL), we propose two hyperlink based relevant page finding algorithms. The first algorithm comes from the extended co-citation analysis of web pages. It is intuitive and easy to be implemented. The second one takes advantage of linear algebra theories to reveal deeper relationships among the web pages and identify relevant pages more precisely and effectively. The corresponding page source construction for these two algorithms can prevent the results from being affected by malicious hyperlinks on the web. The experiment results show the feasibility and effectiveness of the algorithms. The research results could be used to enhance web search by caching the relevant pages for certain searched pages. For the purpose of clustering web pages to construct a community with its hierarchical cluster structures, we propose an innovative web page similarity measurement that incorporates hyperlink transitivity and page importance (weight).Based on this similarity measurement, two types of hierarchical web page clustering algorithms are proposed. The first one is the improvement of the conventional K-mean algorithms. It is effective in improving page clustering, but is sensitive to the predefined similarity thresholds for clustering. Another type is the matrix-based hierarchical algorithm. Two algorithms of this type are proposed in this work. One takes cluster-overlapping into consideration, another one does not. The matrix-based algorithms do not require predefined similarity thresholds for clustering, are independent of the order in which the pages are presented, and produce stable clustering results. The matrix-based algorithms exploit intrinsic relationships among web pages within a uniform matrix framework, avoid much influence of human interference in the clustering procedure, and are easy to be implemented for applications. The experiments show the effectiveness of the new similarity measurement and the proposed algorithms in web page clustering improvement. For applying above mathematical algorithms better in practice, we generalize the web page discovering as a special case of information retrieval and present a visualization system prototype, as well as technical details on visualization algorithm design, to support information retrieval based on linear algebra. The visualization algorithms could be smoothly applied to web applications. XML is a new standard for data representation and exchange on the Internet. In order to extend our research to cover this important web data, we propose an object representation model (ORM) for XML data. A set of transformation rules and algorithms are established to transform XML data (DTD and XML documents with DTD or without DTD) into this model. This model capsulizes elements of XML data and data manipulation methods. DTD-Tree is also defined to describe the logical structure of DTD. It also can be used as an application program interface (API) for processing DTD, such as transforming a DTD document into the ORM. With this data model, semantic meanings of the tags (elements) in XML data can be used for further research in XML data management and information retrieval, such as community construction for XML data.
7

Nové přístupy k automatické detekci XSS chyb / New Approaches Towards Automated XSS Flaw Detection

Steinhauser, Antonín January 2020 (has links)
Cross-site scripting (XSS) flaws are a class of security flaws particular to web applications. XSS flaws generally allow an attacker to supply affected web application with a malicious input that is then included in an output page without being properly encoded (sanitized). Recent advances in web applica- tion technologies and web browsers introduced various prevention mechanisms, narrowing down the scope of possible XSS attacks, but those mechanisms are usually selective and prevent only a subset of XSS flaws. Among the types of XSS flaws that are largely omitted are the context- sensitive XSS flaws. A context-sensitive XSS flaw occurs when the potentially malicious input is sanitized by the affected web application before being included in the output page, but the sanitization is not appropriate for the browser con- text of the sanitized value. Another type of XSS flaws, which is already better known, but still insufficiently prevented, are the stored XSS flaws. Applica- tions affected by the stored XSS flaws store the unsafe client input in persistent storage and return it in another HTTP response to (possibly) another client. Our work is focused on advancing state-of-the-art automated detection of those two types of XSS flaws using various analysis techniques ranging from purely static analysis to dynamic graybox analysis.
8

Tillitens nödvändiga förutsättningar? : En undersökning av svenska konsumenters köpbeteende vid näthandel inom landet och gentemot Polen, Tyskland och USA

Johansson, Per, Sjölin, Henry January 2011 (has links)
I och med att människor runt omkring i världen idag kopplas ihop med hjälp av ny teknik och kommunikationsmedier är det intressant att studera hur konsumenter från ett visst land ser på handel med andra länder på nätet. Denna studie syftar till att skildra vilka faktorer på landsnivå som gör att svenska konsumenter väljer att näthandla en digitalkamera från ett land framför ett annat. Mer specifikt utreder studien svenska konsumenters köpbeteende vid näthandel inom landet och gentemot Polen, Tyskland och USA. Tidigare forskning har visat att tillit har en viktig betydelse vid handel mellan länder och näthandel (Michaelis et al, 2008; Connolly & Bannister, 2008). Därför kopplas landsfaktorerna i studien ihop med en egenkonstruerad tillitsmodell som bygger på tidigare teorier om tillit. Med hjälp av en enkätundersökning som genomfördes bland studenter på Uppsala Universitet kom denna studie fram till att faktorer som språk, informationsteknologins utveckling samt lagar och förordningar alla påverkar tilliten vid näthandel. Respondenterna i enkätundersökningen föredrog att handla från svenska webbsidor i första hand, sedan i turordning amerikanska, tyska, och i sista hand polska.
9

Informacinių technologijų katedros studentų serverio žiniatinklis / Web Server of Department of Information Technology Students

Titenis, Žilvinas 04 August 2011 (has links)
IT katedroje paskutinio kurso studentams yra sukurtas specialus serveris rude.su.lt. Jis naudojamas tik studijų procesui, praktinių darbų (laboratorinių, kursinių) ir bakalauro baigiamųjų darbų pateikimui. Norint naudotis serverio paslaugomis studentas turi rašyti el. paštą administratoriui. Tada administratorius sukuria vartotoją – tai nepatogu nei studentui, nei administratoriui, todėl šio bakalauro baigiamojo darbo tikslas - sukurti tokią sistemą, kuri leistų studentams registruotis ir užsisakyti paslaugas, o administratoriui administruoti ne tik vartotojus, tačiau ir rude.su.lt studentų serverio žiniatinklį. / In the Department of Information Technology is a special server rude.su.lt used only for undergraduate students to study the process of practical work (laboratory, course) and for Bachelor‘s thesis presentation. To use the server services the student needs to write email to webmaster. Then the administrator creates a user – this is inconvenient to a student or administrator. This bachelors‘ thesis goal is to create a system that allows students to register for services and for administrator not only to administer users but also the whole servers‘ web page.
10

Interaktiv marknadsföring och Internet : – En studie utifrån Radi Medical Systems webbplats för kundutbildning

Palmgren, Daniel January 2008 (has links)
<p>Abstract</p><p>Title: Interactive marketing and Internet - A study of Radi Medical Systems’ educational site (Interaktiv marknadsföring och Internet - En studie utifrån Radi Medical Systems webbplats för kundutbildning)</p><p>Number of pages: 43 (including enclosures 47)</p><p>Author: Daniel Palmgren</p><p>Tutor: Mats Lind</p><p>Course: Media and Communication Studies C</p><p>Period: Spring 2008</p><p>University: Division of Media and Communication, Department of Information Science, Uppsala University</p><p>Purpose/Aim: The aim of this thesis is to examine if Radi Medical Systems’ educational site has the potential to create value for the company’s customers, and by that promote improved customer relations. Questions asked are: What kinds of visions does the company have for the site? Which services are offered to the customers through the site? How do the customers experience these sInervices?</p><p>Material/Method: Information from interviews with representatives from Radi Medical Systems and their customers, observations of the webpage and information from an internal Radi document concerning the educational site has been collected and analyzed through the use of a theoretical framework, in order to provide an understanding for the questions asked. The visions were discussed and analyzed by general concepts of interactive marketing and Internet. The concepts of need, adaptation, understanding and time, functionality and trustworthy were used to create a theoretical framework regarding customer experience and customer value on a webpage.</p><p>Main Results: Radi sees the educational site as an important mean to create value for their customers, which is a first step towards being able to provide the customers with relevant and functional services. The services offered through the educational site are information about Radi’s products and the clinical areas they represent in so called modules. Other services offered are multiple choice tests and storage of the customer’s results of the tests. These services constitute a complete training-course for the customers. The customers’ experiences of the services show that the modules mainly have the potential to fulfill the needs of the customers looking for elementary information, and that the multiple choice tests and storage of the results, for the most part, could function as value added activities when the hospitals recruit new doctors and nurses. The customers have the understanding and time necessarily to use the educational site, and the customers who were familiar with Radi as a company didn’t ap rehend any problems regarding the trustworthiness of the site. However, the lack of adaptation makes the site less useful for those customers who consider themselves as advanced users of Radi’s products. Imperfections regarding the functionality of the site were also recognized.</p><p>Keywords: Interactive marketing, Internet, Webpage, Educational site, Customer relations, Customer value</p>

Page generated in 0.0264 seconds