参考文献
[1]中国互联网络信息中心.第39次中国互联网络发展状况统计报告[EB/OL].[2017-03-11].http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201701/t20170122_66437.htm.
[2]CLARK C G.The Truth in Domain Names Act of 2003 and a Preventative Measure to Combat Typosquatting[J].Social Science Electronic Publishing,2006,89(6):1476-1518.
[3]WANG Y M,BECK D,WANG J,et al.Strider Typo-patrol:Discovery and Analysis of Systematic Typos-quatting[C]//Proceedings of 2006 Conference on Steps to Reducing Unwanted Traffic on the Internet.San Jose,USA:USENIX Association,2006:5-9.
[4]VAUGHAN C.Address Bar Improvements in Internet Explorer 8 Beta 1[EB/OL].[2017-03-04].https://blogs.msdn.microsoft.com/ie/2008/03/11/address-bar-improvements-in-internet-explorer-8-beta-1/.
[5]Raytheon.Websense Security Labs Reveals Top Cyber Threat Trends in 2015 Financial Services Drill-down Report[EB/OL].[2017-04-23].https://www.thefreelibrary.com/Websense+Security+Labs+Reveals+Top+Cyber+Threat+Trends+in+2015+…-a0418987077.
[6]Cybersquatting[EB/OL].[2017-04-26].http://www.thefreedictionary.com /cybersquatting.
[7]BENJAMIN E.Large-scale Registration of Domains with Typographical Errors[EB/OL].[2017-03-03].https://cyber.harvard.edu/archived_content/people/edelman/typo-domains/.
[8]DINABURG A.Bitsquatting:DNS Hijacking Without Exploitation[EB/OL].[2017-03-18].https://media.blackhat.com/bh-us-11/Dinaburg/BH_US_11_Dinaburg_Bitsquatting_WP.pdf.
[9]NIKIFORAKIS N,BALDUZZI M,DESMET L,et al.Soundsquatting:Uncovering the Use of Homophones in Domain Squatting[M].Berlin,Germany:Springer,2014.
[10]Amazon.Alexa Top Sites[EB/OL].[2017-03-23].http://www.alexa.com/topsites.
[11]KHAN M T,HUO X,LI Z,et al.Every Second Counts:Quantifying the Negative Externalities of Cybercrime via Typosquatting[J].Neural Computation,2015,6(5):135-150.
[12]SZURDI J,KOCSO B,CSEH G,et al.The Long “Taile” of Typosquatting Domain Names[C]//Proceedings of the 23rd USENIX Conference on Security Symposium.San Diego,USA:USENIX Association,2014:191-206.
[13]AGTEN P,JOOSEN W,PIESSENS F,et al.Seven Months’ Worth of Mistakes:A Longitudinal Study of Typosquatting Abuse[C]//Proceedings of the 22nd Annual Network and Distributed System Security Symposium.San Diego,USA:Internet Society,2015:156-168.
[14]BANERJEE A,RAHMAN M S,FALOUTSOS M.SUT:Quantifying and Mitigating URL Typosquatting[J].Computer Networks,2011,55(13):3001-3014.
[15]MOORE T,EDELMAN B.Measuring the Perpetrators and Funders of Typosquatting[C]//Proceedings of the 14th International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2010:175-191.
[16]BANERJEE A,BARMAN D,FALOUTSOS M,et al.Cyber-fraud is One Typo Away[C]//Proceedings of IEEE International Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2008:1939-1947.
[17]VISSERS T,JOOSEN W,NIKIDORAKIS N.Parking Sensors:Analyzing and Detecting Parked Domains[C]//Proceedings of the 22nd Annual Network and Distributed System Security Symposium.San Diego,USA:Internet Society,2015:53-58.
[18]HIDAYAT A.PhantomJs API[EB/OL].[2017-04-14].http://phantomjs.org/api/.
[19]XIANG G,HONG J,ROSE C P,et al.CANTINA+:A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites [J].ACM Transactions on Infor-mation and System Security,2011,14(2):613-622.
[20]SPAULDING J,UPADHYAYA S,MOHAISEN A.The Landscape of Domain Name Typosquatting:Techniques and Countermeasures[C]//Proceedings of the 11th International Conference on Availability,Reliability and Security.Washington D.C.,USA:IEEE Computer Society,2016:284-289.
[21]HALVORSON T,LEVCHENKO K,SAVAGE S,et al.XXXtortion?:Inferring Registration Intent in the.XXX TLD [C]//Proceedings of the 23rd International Conference on World Wide Web.New York,USA:ACM Press,2014:901-912.
[22]Malware Research and Threat Intellgence Team.Typosquatting Have in Common?[EB/OL].[2017-04-23].https://www.endgame.com/blog/what-does-oman-house-cards-and-typosquatting-have-common-om-domain-and-dangers-typosquatting.
[23]HALVORSON T,SZURDI J,MAIER G,et al.The BIZ Top-level Domain:Ten Years Later[C]//Proceedings of the 13th International Conference on Passive and Active Measurement.Berlin,Germany:Springer,2012:221-230.
[24]马旸,强小辉,蔡冰,等.大规模网络中基于集成学习的恶意域名检测[J].计算机工程,2016,42(11):170-176.
[25]NIKIFORAKIS N,ACKER S V,MEERT W,et al.Bitsquatting:Exploiting Bit-flips for Fun,or Profit?[C]//Proceedings of International Conference on World Wide Web.New York,USA:ACM Press,2013:989-998.
[26]刘梅,张永斌,冉崇善,等.基于权威DNS服务器的停靠域名识别机制研究[J].计算机应用,2016,36(12):3311-3316.
[27]LIU T,ZHANG Y,SHI J,et al.Towards Quantifying Visual Similarity of Domain Names for Combating Typosquatting Abuse[C]//Proceedings of 2016 IEEE Military Communications Conference.Washington D.C.,USA:IEEE Press,2016:770-775.
[28]ALMISHARI M,YANG X.Ads-portal Domains:Identification and Measurements[J].ACM Transactions on the Web,2010,4(2):163-172.
[29]STROMBOM A C.Internet Outlaws:Knowingly Placing Ads on Parked Domain Names Invokes Contributory Trademark Liability[J].University of California Transportation Center Working Papers,2013,38(8):956-962.
[30]MIEHLING M J.Correlation of Affiliate Performance Against Web Evaluation Metrics[D].Edinburgh,UK:Edinburgh Napier University,2014.
[31]BUREMA H,MAKINO Y.System and Method for Tracking Affiliates and Merchants:2002013076[P].2001-08-07.
[32]LEVCHENKO K,PITSILLIDIS A,CHACHRA N,et al.Click Trajectories:End-to-end Analysis of the Spam Value Chain[C]//Proceedings of the 32nd IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2011:431-446.
[33]CHACHRA N,SAVAGE S,VOELKER G M.Affiliate Crookies:Characterizing Affiliate Marketing Abuse[C]//Proceedings of 2015 ACM Internet Measurement Conference.New York,USA:ACM Press,2015:41-47.
[34]NIKIFORAKIS N,INVEMIZZI L,KAPRAVELOS A,et al.You Are What You Include:Large-scale Evaluation of Remote Javascript Inclusions[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:736-747.
[35]ABDELHAMID N,AYESH A,THABTAH F.Phishing Detection Based Associative Classification Data Mining[J].Expert Systems with Applications,2014,41(13):5948-5959.
[36]MARCHAL S,FRANCOIS J,STATE R,et al.PhishStorm:Detecting Phishing with Streaming Analytics[J].IEEE Transactions on Network and Service Management,2014,11(4):458-471.
[37]JR I W.Website Forgery:Understanding Phishing Attacks and Nontechnical Countermeasures for Ordinary Users,IN 47907-2086[R].West Lafayette,USA:Center for Education and Research of Purdue University,2015.
[38]DHARMAADI I P A,BAKHRUN A,SAPUTRA D,et al.Typo-squatting Crime in Indonesia Online Banking[C]//Proceedings of International Conference on Information Technology Systems and Innovation.Washington D.C.,USA:IEEE Press,2014:269-272.
[39]SPAULDING J,KANG A R,UPADHYAYA S,et al.A User Study of the Effectiveness of Typosquatting Techniques [C]//Proceedings of 2016 IEEE Conference on Communications and Network Security.Washington D.C.,USA:IEEE Press,2016:360-361.
[40]LIN E,GREENBERG S,TROTTER E,et al.Does Domain Highlighting Help People Identify Phishing Sites?[C]//Proceedings of International Conference on Human Factors in Computing Systems.Washington D.C.,USA:IEEE Press,2011:2075-2084.
[41]FINKE C.URL Fixer-download[EB/OL].[2017-04-06].https://github.com/cfinke/URL-Fixer.
[42]CHEN G C G,JOHNSON M F,MARUPALLY P R,et al.Combating Typo-squatting for Safer Browsing[C]//
Proceedings of the 23rd International Conference on
Advanced Information Networking and Applications.Washington D.C.,USA:IEEE Computer Society,2009:26-29.
[43]薛虹.网络时代的知识产权法[M].北京:法律出版社,2000.
[44]ICANN.The Internet Corporation for Assigned Names and Numbers [EB/OL].[2017-04-06].https://www.icann.org/ policy.
[45]Cybertelecom:Anticyberquatting Consumer Protection Act[EB/OL].[2017-04-04].http://www.cybertelecom.org/dns/acpa.htm.
[46]豪威特,王菲萍.域名争议与商标侵权[J].国外社会科学文摘,1999(6):45-48.
[47]Pengelola Name Domain Internet Indonesla.Tentang Pandi[EB/OL].[2017-04-28].http://www.pandi.id/.
[48]Wikipedia Indonesia:Undang-undang Informasi dan Transaksi Elektronik[EB/OL].[2017-04-16].http://id.wikipedia.org/wiki/Undangundang_Informasi_dan_Transaksi_Elektronik.
[49]郅飞.网络域名抢注法律问题研究[D].呼和浩特:内蒙古大学,2012.
[50]朱旻卿.略论域名抢注与商标保护[D].上海:华东政法大学,2012.
[51]程永顺.审理域名注册纠纷案件的若干问题[J].知识产权,2001,11(1):53-54.
[52]刘艺工,周久人.域名抢注的法律问题探析[J].长春理工大学学报(社会科学版),2012,25(10):20-22.
[53]最高人民法院审判委员会.最高人民法院关于审理涉及计算机网络域名民事纠纷案件适用法律若干问题的解释[J].中华人民共和国最高人民法院公报,2001(10):21-22.
[54]国务院信息化工作领导小组办公室.中国互联网络信息中心宣布成立——《中国互联网络域名注册暂行管理办法》发布[J].中国教育信息化,1997(8):61-62.
[55]中国互联网络信息中心.中国互联网络信息中心域名争议解决办法[EB/OL].[2017-04-26].http://www.cnnic.cn/ggfw/fwzxxgzcfg/2012/01207/t20120731_32910.htm.
编辑吴云芳 |