Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013 (2013), Article ID 704865, 11 pages
http://dx.doi.org/10.1155/2013/704865
Research Article

Multiple-Feature Extracting Modules Based Leak Mining System Design

Department of Electrical Engineering, CCU University, Chia-Yi 62102, Taiwan

Received 23 September 2013; Accepted 27 October 2013

Academic Editors: W. Sun, G. Zhang, and J. Zhou

Copyright © 2013 Ying-Chiang Cho and Jen-Yi Pan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Hoanga, “How good are our weapons in the spam wars?” IEEE Technology and Society Magazine, vol. 25, no. 1, pp. 22–30, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Feng, “The security mechanism of network database,” in Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation (ICMTMA '11), pp. 939–940, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Geer, “Malicious bots threaten network security,” Computer, vol. 38, no. 1, pp. 18–20, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. P. O. Boykin and V. P. Roychowdhury, “Leveraging social networks to fight spam,” Computer, vol. 38, no. 4, pp. 61–68, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Castillo, “Effective web crawling,” in Computer Science, The University of Chile in fulfillment: ACM SIGIR Forum, 2004. View at Google Scholar
  6. W. Tong and X. Xie, “A research on a defending policy against the Webcrawler's attack,” in Proceedings of the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID '09), August 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Sun, I. G. Councill, and C. L. Giles, “The ethicality of web crawlers,” in Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI '10), pp. 668–675, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. M. MeiJunjin, “An approach for SQL injection vulnerability detection,” in Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG '09), pp. 1411–1414, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Jawaheer and P. Kostkova, “Web crawlers on a health related portal: detection, characterisation and implications,” in Proceedings of the 4th International Conference on Developments in eSystems Engineering (DeSE '11), pp. 24–29, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Heymann, G. Koutrika, and H. Garcia-Molina, “Fighting spam on social web sites: a survey of approaches and future challenges,” IEEE Internet Computing, vol. 11, no. 6, pp. 36–45, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Shar and H. Tan, “Defeating SQL injection,” Computer, no. 99, p. 1, 2012. View at Google Scholar
  12. J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, “State of the art: automated black-box web application vulnerability testing,” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 332–345, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Khoury, P. Zavarsky, D. Lindskog, and R. Ruhl, “An analysis of black-box web application security scanners against stored SQL injection,” in Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, and IEEE International Conference on Social Computing (SocialCom '11), pp. 1095–1101, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, “State of the art: automated black-box web application vulnerability testing,” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 332–345, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Cho, H. Garcia-Molina, and L. Page, “Efficient crawling through URL ordering,” in Proceedings of the 7th International WWW Conference, pp. 161–172, 1998.
  16. A. Z. Broder, M. Najork, and J. L. Wiener, “Efficient URL caching for world wide web crawling,” in Proceedings of the 12th International WWW Conference, 2003.
  17. V. Shkapenyuk and T. Suel, “Design and implementation of a high-performance distributed web crawler,” in Proceedings of the 18th International Conference on Data Engineering, pp. 357–368, March 2002. View at Scopus
  18. M. Najork, “Breadth-first search crawling yields high-quality pages,” in Proceedings of the 10th International World Wide Web Conference, 2001.
  19. J. B. Anderson and S. Mohan, “Sequential coding algorithms: a survey and cost analysis,” IEEE Transactions on Communications, vol. 32, no. 2, pp. 169–176, 1984. View at Google Scholar · View at Scopus
  20. L. Zhao, H. Xu, J. Li, and Q. Cai, “A kind of map coloring algorithm considering of depth first search,” in International Conference on Industrial Control and Electronics Engineering (ICICEE '12), pp. 648–651, 2012. View at Publisher · View at Google Scholar
  21. R. Baeza-Yates, C. Castillo, M. Marin, and A. Rodriguez, “Crawling a country: better strategies than breadth-first for web page ordering,” in Proceedings of the 14th International World Wide Web Conference (WWW '05), pp. 864–872, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. C. F. Diligentim and L. S. Focused, “Crawling using context graphs,” in Proceedings of the 26th International Conference on Very Large Data Bases, 2000.
  23. J. Qin, Y. Zhou, and M. Chau, “Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method,” in Proceedings of the 4th ACM/IEEE Joint Conference on Digital Libraries; Global reach and Diverse Impact (JCDL '04), pp. 135–141, June 2004. View at Scopus
  24. J. Rennie and A. K. McCallum, “Using reinforcement learning to spider the web efficiently,” in Proceedings of the 16th International Conference on Machine Learning, 1999.
  25. S. Chakrabarti, M. Berg, and B. Dom, “Focused crawling: a new approach to topic-specific web resource discovery,” in Proceedings of the 8th International WWW Conference, 1999.
  26. S. Chakrabarti, D. A. Gibson, and K. S. McCurley, “Surfing the web backwards,” Computer Networks, vol. 31, no. 11, pp. 1679–1693, 1999. View at Publisher · View at Google Scholar · View at Scopus
  27. G. J. Houben, Y. Kornatzky, and R. Post, “Information retrieval in distributed hypertexts,” in Proceedings of the 4th RIAO Conference, 1994.
  28. M. Jacovi, “The shark-search algorithm. An application: tailored web site mapping,” Computer Networks, vol. 30, no. 1–7, pp. 317–326, 1998. View at Google Scholar · View at Scopus
  29. S. B. L. Page, “The anatomy of a large-scale hypertextual web search engine,” in Proceedings of the 7th International WWW Conference, 1998.
  30. P. Lawrence, S. Brin, R. Motwani, and T. Winograd, “The PageRank citation ranking: bringing order to the Web,” in Proceedings of the 7th International WWW Conference, 1999.
  31. T. H. Haveliwala, “Topic-sensitive PageRank,” in Proceedings of the 11th International Conference on World Wide Web (WWW '02), pp. 517–526, May 2002. View at Publisher · View at Google Scholar · View at Scopus
  32. Y. Ding, F. Scharffe, A. Harth, and A. Hogan, “AuthorRank: ranking improvement for the web,” in Proceedings of the International Conference on Semantic Web and Web Services, 2006.
  33. J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol. 46, no. 5, pp. 604–632, 1999. View at Google Scholar · View at Scopus
  34. W. Xing and A. Ghorbani, “Weighted PageRank algorithm,” in Proceedings of the 2nd Annual Conference on Communication Networks and Services Research, pp. 305–314, May 2004. View at Scopus
  35. Y. Zhang, C. Yin, and F. Yuan, “An application of improved PageRank in focused crawler,” in Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '07), pp. 331–335, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  36. S. Chakrabarti, B. Dom, P. Raghavan, S. Rajagopalan, D. Gibson, and J. Kleinberg, “Automatic resource compilation by analyzing hyperlink structure and associated text,” in Proceedings of the 7th International WWW Conference, pp. 65–74, 1998. View at Publisher · View at Google Scholar
  37. P. Gawrysiak, “Using data mining methodology for text retrieval,” in Proceedings of the International Information Science and Education Conference, 1999.
  38. IBM, “Clever System (HITS)—a page ranking algorithm developed,” 2004, http://www.ecsl.cs.sunysb.edu/~chiueh/cse646/cn4/cn4.html.
  39. G. Pant and P. Srinivasan, “Link contexts in classifier-guided topical crawlers,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 107–122, 2006. View at Publisher · View at Google Scholar · View at Scopus
  40. F. Menczer and R. K. Belew, “Adaptive retrieval agents: internalizing local context and scaling up to the Web,” Machine Learning, vol. 39, no. 2, pp. 203–242, 2000. View at Google Scholar · View at Scopus
  41. J. Johnson, K. Tsioutsiouliklis, and C. Lee Giles, “Evolving strategies for focused web crawling,” in Proceedings of the 20th International Conference on Machine Learning, pp. 298–305, August 2003. View at Scopus
  42. Y. Chun and Z. Hang, “Research on tunnel phenomenon in focused crawler,” in Proceedings of the International Conference on Internet Technology and Applications (ITAP '10), August 2010. View at Publisher · View at Google Scholar · View at Scopus
  43. C. Anley, More Advanced SQL Injection, An NGSSoftware Insight Security Research (NISR) Publication, 2002.
  44. Y. J. Yang and Y. X. Yu, “Behavioral science-based information security research,” in Proceedings of the 1st International Workshop on Education Technology and Computer Science (ETCS '09), pp. 428–432, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. C. Anley, Advanced SQL injection in SQL Server Applications, An NGSSoftware Insight Security Research (NISR) Publication, 2002.
  46. V. Chapela, Advanced SQL Injection, 2005.
  47. D. A. Kindy and A.-S. K. Pathan, “A survey on SQL injection: vulnerabilities, attacks, and prevention techniques,” in Proceedings of the 15th IEEE International Symposium on Consumer Electronics (ISCE '11), pp. 468–471, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  48. R. Johari and P. Sharma, “A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection,” in Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT '12), 2012.
  49. S. Bondar, “Search engine indexing limits: where do the bots stop,” 2006, http://www.sitepoint.com/indexing-limits-where-bots-stop/.
  50. B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, “Accessing the deep Web,” Communications of the ACM, vol. 50, no. 5, pp. 94–101, 2007. View at Publisher · View at Google Scholar · View at Scopus
  51. O. Security, “The Exploit Database,” 2012, http://www.exploit-db.com/.
  52. S. Imran and I. Hyder, “Security issues in databases,” in Proceedings of the 2nd International Conference on Future Information Technology and Management Engineering (FITME '09), pp. 541–545, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  53. S. W. Boyd and A. D. Keromytis, “SQLrand: preventing SQL injection attacks,” in Proceedings of the 2nd Conference on Applied Cryptography and Network Security, pp. 292–302, 2004. View at Publisher · View at Google Scholar
  54. Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo, “Securing web application code by static analysis and runtime protection,” in Proceedings of the 13th International World Wide Web Conference Proceedings (WWW '04), pp. 40–52, May 2004. View at Scopus
  55. R. Overstreet, Protecting Yourself from SQL Injection Attacks, 2006.
  56. M. Ficco, L. Coppolino, and L. Romano, “A weight-based symptom correlation approach to SQL injection attacks,” in Proceedings of the 4th Latin-American Symposium on Dependable Computing (LADC '09), pp. 9–16, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  57. A. Mohosina and M. Zulkernine, “DESERVE: a framework for detecting program security vulnerability exploitations,” in Proceedings of the 6th IEEE International Conference on Software Security and Reliability (SERE '12), 2012.
  58. C. Mainka, J. Somorovsky, and J. Schwenk, “Penetration testing tool for web services security,” in Proceedings of the 8th IEEE World Congress on Services (SERVICES '12), 2012.
  59. R. Xu, J. Guo, and L. Deng, “A database security gateway to the detection of SQL attacks,” in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE '10), pp. 3537–3540, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  60. G. Agosta, A. Barenghi, A. Parata, and G. Pelosi, “Automated security analysis of dynamic web applications through symbolic code execution,” in Proceedings of the 9th International Conference on Information Technology: New Generations (ITNG '12), pp. 189–194, 2012. View at Publisher · View at Google Scholar