Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity

被引:0
|
作者
Mekky, Hesham [1 ]
Torrest, Ruben [2 ]
Zhang, Zhi-Li [1 ]
Saha, Sabyasachi [2 ]
Nucci, Antonio [2 ]
机构
[1] Univ Minnesota, Minneapolis, MN 55455 USA
[2] Narus Inc, Sunnyvale, CA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The web has become a platform that attackers exploit to infect vulnerable hosts, or deceive victims into buying rogue software. To accomplish this, attackers either inject malicious scripts into popular web sites or manipulate content delivered by servers to exploit vulnerabilities in users' browsers. To hide malware distribution servers, attackers employ HTTP redirections, which automatically redirect users' requests through a series of intermediate web sites, before landing on the final distribution site. In this paper, we develop a methodology to identify malicious chains of HTTP redirections. We build per-user chains from passively collected traffic and extract novel statistical features from them, which capture inherent characteristics from malicious redirection cases. Then, we apply a supervised decision tree classifier to identify malicious chains. Using a large ISP dataset, with more than 15K clients, we demonstrate that our methodology is very effective in accurately identifying malicious chains, with recall and precision values over 90% and up to 98%.
引用
收藏
页码:1159 / 1167
页数:9
相关论文
共 50 条
  • [1] Significant Factors for Detecting Malicious Redirections
    Hans, Kanchan
    Ahuja, Laxmi
    Muttoo, S. K.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 499 - 502
  • [2] A Method of Detecting a Malicious Actions using HTTP and FTP Protocols
    Silnov, D. S.
    Prokofiev, A. O.
    Berezovskaya, G.
    Perevozchikov, V. A.
    Troitskiy, S. S.
    Shumakov, I. U.
    [J]. PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, : 1083 - 1088
  • [3] Detecting Malicious User Accounts Using Canvas Fingerprint
    Abouollo, Ahmed
    Almuhammadi, Sultan
    [J]. 2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 358 - 361
  • [4] Detecting Malicious Clients in ISP Networks Using HTTP Connectivity Graph and Flow Information
    Liu, Lei
    Saha, Sabyasachi
    Torres, Ruben
    Xu, Jianpeng
    Tan, Pang-Ning
    Nucci, Antonio
    Mellia, Marco
    [J]. 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 150 - 157
  • [5] Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information
    Liu, Lei
    Saha, Sabyasachi
    Torres, Ruben
    Xut, Jianpeng
    Tant, Pang-Ning
    Nucci, Antonio
    Mellia, Marco
    [J]. HP Laboratories Technical Report, 2015, (29):
  • [6] Detecting Malicious HTTP Requests Without Log Parser Using RequestBERT-BiLSTM
    Ramos Junior, Levi S.
    Macedo, David
    Oliveira, Adriano L., I
    Zanchettin, Cleber
    [J]. INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 328 - 342
  • [7] A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites
    McGahagan, John
    Bhansali, Darshan
    Gratian, Margaret
    Cukier, Michel
    [J]. 2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 75 - 82
  • [8] Detecting malicious pilot contamination in multiuser massive MIMO using decision trees
    da Cruz, Pedro Ivo
    Leandro, Dimitri
    Spadini, Tito
    Suyama, Ricardo
    Loiola, Murilo Bellezoni
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 86 (04) : 797 - 809
  • [9] Detecting malicious activity in Twitter using deep learning techniques
    Ilias, Loukas
    Roussaki, Ioanna
    [J]. APPLIED SOFT COMPUTING, 2021, 107
  • [10] The Activity Analysis of Malicious HTTP-based Botnets using Degree of Periodic Repeatability
    Lee, Jae-Seo
    Jeong, HyunCheol
    Park, Jun-Hyung
    Kim, Minsoo
    Noh, Bong-Nam
    [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 83 - +