{"id":"https://openalex.org/W2441073633","doi":"https://doi.org/10.1109/ifipnetworking.2016.7497222","title":"\u201cInfect-me-not\u201d: A user-centric and site-centric study of web-based malware","display_name":"\u201cInfect-me-not\u201d: A user-centric and site-centric study of web-based malware","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2441073633","doi":"https://doi.org/10.1109/ifipnetworking.2016.7497222","mag":"2441073633"},"language":"en","primary_location":{"id":"doi:10.1109/ifipnetworking.2016.7497222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2016.7497222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046612532","display_name":"Huy Hang","orcid":null},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Huy Hang","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057271353","display_name":"Adnan Bashir","orcid":"https://orcid.org/0000-0003-3183-7316"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adnan Bashir","raw_affiliation_strings":["Department of Computer Science, University of New Mexico, Albuquerque, Albuquerque, NM"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of New Mexico, Albuquerque, Albuquerque, NM","institution_ids":["https://openalex.org/I169521973"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018876909","display_name":"Michalis Faloutsos","orcid":"https://orcid.org/0000-0002-3882-9987"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michalis Faloutsos","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035605036","display_name":"Christos Faloutsos","orcid":"https://orcid.org/0000-0003-2996-9790"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christos Faloutsos","raw_affiliation_strings":["Department of Computer Science, Carnegie Mellon University, Pittsburg, PA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Carnegie Mellon University, Pittsburg, PA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033409139","display_name":"Tudor Dumitra\u015f","orcid":"https://orcid.org/0000-0003-4350-7226"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tudor Dumitras","raw_affiliation_strings":["ECE Department, University of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"ECE Department, University of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046612532"],"corresponding_institution_ids":["https://openalex.org/I103635307"],"apc_list":null,"apc_paid":null,"fwci":1.9904,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.89396693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"234","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9090791344642639},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7421376705169678},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5891645550727844},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5596994757652283},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.5310084223747253},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.521831214427948},{"id":"https://openalex.org/keywords/spambot","display_name":"Spambot","score":0.4371795058250427},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41752660274505615},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39655280113220215},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.2571445107460022}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9090791344642639},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7421376705169678},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5891645550727844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5596994757652283},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.5310084223747253},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.521831214427948},{"id":"https://openalex.org/C127735637","wikidata":"https://www.wikidata.org/wiki/Q2306702","display_name":"Spambot","level":4,"score":0.4371795058250427},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41752660274505615},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39655280113220215},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.2571445107460022},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ifipnetworking.2016.7497222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2016.7497222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W22566950","https://openalex.org/W162156064","https://openalex.org/W199832099","https://openalex.org/W1420268584","https://openalex.org/W1543320899","https://openalex.org/W1809422330","https://openalex.org/W1827212170","https://openalex.org/W2023973750","https://openalex.org/W2040424958","https://openalex.org/W2049092543","https://openalex.org/W2065890363","https://openalex.org/W2082180526","https://openalex.org/W2084835421","https://openalex.org/W2092756033","https://openalex.org/W2095610745","https://openalex.org/W2114356569","https://openalex.org/W2146729596","https://openalex.org/W2148156428","https://openalex.org/W2151401368","https://openalex.org/W2160289821","https://openalex.org/W2186088793","https://openalex.org/W2211880739","https://openalex.org/W2408371061","https://openalex.org/W6606609320","https://openalex.org/W6628306711","https://openalex.org/W6632659584","https://openalex.org/W6638623425","https://openalex.org/W6662660347","https://openalex.org/W7073872665"],"related_works":["https://openalex.org/W4249009605","https://openalex.org/W2477251628","https://openalex.org/W2900526031","https://openalex.org/W2395100307","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W2968504645","https://openalex.org/W2557742076","https://openalex.org/W4234891089","https://openalex.org/W1956767865"],"abstract_inverted_index":{"Malware":[0],"authors":[1],"have":[2],"been":[3,24],"using":[4],"websites":[5,103,109,129],"to":[6,13,115,123,140,204,242],"distribute":[7],"their":[8,189],"products":[9],"as":[10,37,235],"a":[11,44,65,84,121,171,183,227,236],"way":[12],"evade":[14],"spam":[15],"filters":[16],"and":[17,32,63,67,92,239,246],"classic":[18],"anti-virus":[19],"engines.":[20],"Yet":[21],"there":[22],"has":[23],"relatively":[25],"little":[26],"work":[27],"in":[28,110,221],"modeling":[29,231],"the":[30,107,177,192,199,202],"behaviors":[31],"temporal":[33,179],"properties":[34],"of":[35,70,86,106,133,138,157,174,188,196,201,213],"websites,":[36],"most":[38,187],"research":[39],"focuses":[40],"on":[41,142],"detecting":[42],"whether":[43],"website":[45,143],"distributes":[46],"malware.":[47],"In":[48,113],"this":[49,117],"paper":[50],"we":[51,97,119,146,168],"ask:":[52],"How":[53],"does":[54],"web-based":[55,232],"malware":[56,233],"spread?":[57],"We":[58,72],"conduct":[59,116],"an":[60,131],"extensive":[61],"study":[62,225],"follow":[64],"website-centric":[66],"user-centric":[68],"point":[69],"view.":[71],"collect":[73],"data":[74],"from":[75],"four":[76],"online":[77],"databases,":[78],"including":[79],"Symantec's":[80],"WINE":[81],"Project,":[82],"for":[83,162],"total":[85],"more":[87,216],"than":[88,217],"600K":[89],"malicious":[90,108,128,149,158,205,219],"URLs":[91,150,175],"over":[93],"500K":[94],"users.":[95],"First,":[96],"find":[98,147],"that":[99,148,170,181],"legitimate":[100],"but":[101],"compromised":[102,126],"constitute":[104],"33.1%":[105],"our":[111],"dataset.":[112],"order":[114],"study,":[118],"develop":[120,243],"classifier":[122],"distinguish":[124],"between":[125],"vs.":[127],"with":[130,155,211],"accuracy":[132],"95.3%,":[134],"which":[135],"could":[136],"be":[137,152],"interest":[139],"studies":[141],"profiling.":[144],"Second,":[145],"can":[151],"surprisingly":[153],"long-lived,":[154],"10%":[156],"sites":[159,206,220],"staying":[160],"active":[161],"three":[163],"months":[164],"or":[165],"more.":[166],"Third,":[167],"observe":[169],"significant":[172],"number":[173],"exhibit":[176],"same":[178],"pattern":[180],"suggests":[182],"flush-crowd":[184],"behavior,":[185],"inflicting":[186],"damage":[190],"during":[191],"first":[193,228],"few":[194],"days":[195],"appearance.":[197],"Finally,":[198],"distribution":[200],"visits":[203],"per":[207],"user":[208],"is":[209,226],"skewed,":[210],"1.4%":[212],"users":[214],"visiting":[215],"10":[218],"8":[222],"months.":[223],"Our":[224],"step":[229],"towards":[230],"propagation":[234],"network-wide":[237],"phenomenon":[238],"enabling":[240],"researchers":[241],"realistic":[244],"assumptions":[245],"models.":[247]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
