JOURNAL BROWSE
Search
Advanced SearchSearch Tips
SHRT : New Method of URL Shortening including Relative Word of Target URL
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
SHRT : New Method of URL Shortening including Relative Word of Target URL
Yoon, Soojin; Park, Jeongeun; Choi, Changkuk; Kim, Seungjoo;
  PDF(new window)
 Abstract
Shorten URL service is the method of using short URL instead of long URL, it redirect short url to long URL. While the users of microblog increased rapidly, as the creating and usage of shorten URL is convenient, shorten url became common under the limited length of writing on microblog. E-mail, SMS and books use shorten URL well, because of its simplicity. But, there is no relativeness between the most of shorten URLs and their target URLs, user can not expect the target URL. To cover this problem, there is attempts such as changing the shorten URL service name, inserting the information of website into shorten URL, and the usage of shortcode of physical address. However, each ones has the limits, so these are the trouble of automation, relatively long address, and the narrowness of applicable targets. SHRT is complementary to the attempts, as getting the idea from the writing system of Arabic. Though the writing system of Arabic has no vowel alphabet, Arabs have no difficult to understand their writing. This paper proposes SHRT, new method of URL Shortening. SHRT makes user guess the target URL using Relative word of the lowest domain of target URL without vowels.
 Keywords
URL Shortening;Usable Security;Phishing;Domain;Site Name;
 Language
Korean
 Cited by
1.
OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법,김귀석;김승주;

인터넷정보학회논문지, 2014. vol.15. 6, pp.55-64 crossref(new window)
1.
Secure Short URL Generation Method that Recognizes Risk of Target URL, Wireless Personal Communications, 2017, 93, 1, 269  crossref(new windwow)
 References
1.
IETF, RFC 1738 Uniform Resource Locators(URL)(1994), Retrieved Apr., 8, 2013, from http://www.ietf.org/rfc/rfc1738.txt

2.
KISA, Domain system(2013), Retrieved Apr., 8, 2013, from http://domain.kisa.or.kr/jsp/domain/domainInfo/domainSys.jsp

3.
A. Neumann, J. Barnickel, and U. Meyer, "Security and privacy implications of URL shortening services," in Proc. Workshop on WEB 2.0 SECURITY AND PRIVACY (W2SP) 2011, pp. 1-10, Oakland, U.S.A., May 2011.

4.
N. Megiddo, P. Alto, and K. S. McCurley, "Efficient Retrieval of Uniform Resource Locators," U.S. Patent No. 6,957,224 B1, Oct. 2005.

5.
D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E. P. Markatos, and T. Karagiannis, "We.b: the web of short urls," in Proc. 20th Int. Conf. World Wide Web, pp.715-724, Hyderabad, India, Mar. 2011.

6.
D. K. McGrath and M. Gupta, "Behind phishing: an examination of Phisher modi operandi," in Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), article no. 4, San Francisco, U.S.A., Apr. 2008.

7.
C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the underground on 140 characters or less," in Proc. 17th ACM Conf. Comput. Commun. Security (CCS'10), pp.27-37, Chicago, U.S.A., Oct. 2010.

8.
G. Kontaxis, I. Polakis, M. Polychronakis, and E. P. Markatos, "dead.drop: URL-Based Stealthy Messaging," in Proc. 7th European Conf. Comput. Network Defense (EC2ND), pp.17-24, Gothenburg, Sweden, Sep. 2011.

9.
E. Vishria, S. Carlos, T. Howes, L. Altos, and R. Churehill, "Integrated Adaptive URL-Shortening Functionality," U.S. Patent No. US 2011/0264992 A1, Oct. 2011.

10.
S. L. Hancock, "Systems and methods for creating and using imbedded shortcodes and shortened physical and internet addresses," U.S. Patent 2011/0244882 A1, Oct. 2011.

11.
J. Park, S. Yoon, and S. Kim, "A Phishing link prevention for QR code and shortend URL on smart phone," in Proc. CISC-S'12, pp. 241-245, Cheonan, Korea, June 2012.

12.
I. Jo and H. Y. Yeom, "Evaluation of the domain-content relevancy as a key feature of Phishing detection," in Proc. Conf. KICS, pp. 789-791, Suwon, Korea, Nov. 2011.

13.
Microsoft, Microsoft Exchange Server - Modify a Database Size Limit(2010), Retrieved Apr., 8, 2013, from http://technet.microsoft.com/en-us/library/bb23 2092.aspx

14.
Whois Source, Domain Counts & Internet Statistics(2013), Retrieved Apr., 8, 2013, from http://www.whois.sc/internet-statistics