{"id":"https://openalex.org/W2805804439","doi":"https://doi.org/10.1145/3196494.3196542","title":"Investigating Web Defacement Campaigns at Large","display_name":"Investigating Web Defacement Campaigns at Large","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805804439","doi":"https://doi.org/10.1145/3196494.3196542","mag":"2805804439"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196542","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055678575","display_name":"Federico Maggi","orcid":"https://orcid.org/0000-0003-1073-8036"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Federico Maggi","raw_affiliation_strings":["Trend Micro, Inc., Sesto San Giovanni, Italy"],"affiliations":[{"raw_affiliation_string":"Trend Micro, Inc., Sesto San Giovanni, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048021434","display_name":"Marco Balduzzi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marco Balduzzi","raw_affiliation_strings":["Trend Micro, Inc., Sesto San Giovanni, Italy"],"affiliations":[{"raw_affiliation_string":"Trend Micro, Inc., Sesto San Giovanni, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108678712","display_name":"Ryan Flores","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ryan Flores","raw_affiliation_strings":["Trend Micro, Inc., Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Trend Micro, Inc., Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035936798","display_name":"Lion Gu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lion Gu","raw_affiliation_strings":["Trend Micro, Inc., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Trend Micro, Inc., Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052304726","display_name":"Vincenzo Ciancaglini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vincenzo Ciancaglini","raw_affiliation_strings":["Trend Micro, Inc., Paris, France"],"affiliations":[{"raw_affiliation_string":"Trend Micro, Inc., Paris, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5055678575"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.6757,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.96953309,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"443","last_page":"456"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7053162455558777},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6884244084358215},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5029694437980652},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4362652599811554},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37975165247917175},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35275816917419434},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.11795097589492798},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11315366625785828},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0945577621459961}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7053162455558777},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6884244084358215},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5029694437980652},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4362652599811554},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37975165247917175},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35275816917419434},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.11795097589492798},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11315366625785828},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0945577621459961},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196542","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1851665508","https://openalex.org/W1879182220","https://openalex.org/W1880262756","https://openalex.org/W2055422171","https://openalex.org/W2076951575","https://openalex.org/W2095897464","https://openalex.org/W2342249984","https://openalex.org/W2997591727"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4392337488","https://openalex.org/W2102271161","https://openalex.org/W4313425421","https://openalex.org/W4388714791","https://openalex.org/W2361883455","https://openalex.org/W2952832228","https://openalex.org/W2909324362","https://openalex.org/W2372868951","https://openalex.org/W570712888"],"abstract_inverted_index":{"Website":[0],"defacement":[1,43,131,148,168],"is":[2,98,174],"the":[3,7,24,29,42,54,58,66,76,125,162,187],"practice":[4],"of":[5,10,28,83,96,118,145],"altering":[6],"web":[8,167],"pages":[9],"a":[11,81,142],"website":[12],"after":[13],"its":[14],"compromise.":[15],"The":[16],"altered":[17],"pages,":[18,20],"calleddeface":[19],"can":[21],"negatively":[22],"affect":[23],"reputation":[25],"and":[26,70,73,100,133],"business":[27],"victim":[30],"site.":[31],"Previous":[32],"research":[33],"has":[34],"focused":[35],"primarily":[36],"on":[37,94,166,186],"detection,":[38],"rather":[39],"than":[40],"exploring":[41],"phenomenon":[44],"in":[45],"depth.":[46],"While":[47],"investigating":[48],"several":[49],"defacements,":[50],"we":[51,107],"observed":[52],"that":[53,112],"artifacts":[55],"left":[56],"by":[57,128,180],"defacers":[59],"allow":[60],"an":[61,109],"expert":[62],"analyst":[63],"to":[64,80,138,141,153,160,176,182],"investigate":[65],"actors'":[67],"modus":[68],"operandi":[69],"social":[71],"structure,":[72],"expand":[74],"from":[75,150],"single":[77],"deface":[78,120],"page":[79],"group":[82],"related":[84],"defacements":[85],"(i.e.,":[86],"acampaign":[87],").":[88],"However,":[89],"manually":[90],"performing":[91],"such":[92],"analysis":[93],"millions":[95],"incidents":[97],"tedious,":[99],"poses":[101],"scalability":[102],"challenges.":[103],"From":[104],"these":[105],"observations,":[106],"propose":[108],"automated":[110],"approach":[111,123,157,173],"efficiently":[113],"builds":[114],"intelligence":[115],"information":[116],"out":[117],"raw":[119],"pages.":[121],"Our":[122],"streamlines":[124],"analysts":[126,181],"job":[127],"automatically":[129],"recognizing":[130],"campaigns,":[132],"assigning":[134],"meaningful":[135],"textual":[136],"labels":[137],"them.":[139],"Applied":[140],"comprehensive":[143],"dataset":[144],"13":[146],"million":[147],"records,":[149],"Jan.":[151],"1998":[152],"Sept.":[154],"2016,":[155],"our":[156,172],"allowed":[158],"us":[159],"conduct":[161],"first":[163],"large-scale":[164],"measurement":[165],"campaigns.":[169],"In":[170],"addition,":[171],"meant":[175],"be":[177],"adopted":[178],"operationally":[179],"identify":[183],"live":[184],"campaigns":[185],"field.":[188]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
