Detecting Malicious Exploit Kits using Tree-based Similarity Searches

被引:20
|
作者
Taylor, Teryl [1 ]
Hu, Xin [2 ]
Wang, Ting [3 ]
Jang, Jiyong [2 ]
Stoecklin, Marc Ph. [2 ]
Monrose, Fabian [1 ]
Sailer, Reiner [2 ]
机构
[1] Univ North Carolina Chapel Hill, Chapel Hill, NC 27514 USA
[2] IBM TJ Watson Res Ctr, Armonk, NY 10504 USA
[3] Lehigh Univ, Bethlehem, PA USA
关键词
D O I
10.1145/2857705.2857718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malvertising, redirects browsers to web-based exploit kits that are designed to find vulnerabilities in the browser and subsequently download malicious payloads. We propose a new approach for detecting such malfeasance by leveraging the inherent structural patterns in HTTP traffic to classify exploit kit instances. Our key insight is that an exploit kit leads the browser to download payloads using multiple requests from malicious servers. We capture these interactions in a "tree-like" form, and using a scalable index of malware samples, model the detection process as a sub-tree similarity search problem. The approach is evaluated on 3800 hours of real-world traffic including over 4 billion flows and reduces false positive rates by four orders of magnitude over current state-of-the-art techniques with comparable true positive rates. We show that our approach can operate in near real-time, and is able to handle peak traffic levels on a large enterprise network-identifying 28 new exploit kit instances during our analysis period.
引用
收藏
页码:255 / 266
页数:12
相关论文
共 50 条
  • [21] POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
    Shibahara, Toshiki
    Yagi, Takeshi
    Akiyama, Mitsuaki
    Takata, Yuta
    Yada, Takeshi
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1671 - 1673
  • [22] A Markov Detection Tree-Based Centralized Scheme to Automatically Identify Malicious Webpages on Cloud platforms
    Liu, Jianhua
    Xu, Mengda
    Wang, Xin
    Shen, Shigen
    Li, Minglu
    IEEE ACCESS, 2018, 6 : 74025 - 74038
  • [23] An N-ary Tree-based Model for Similarity Evaluation on Mathematical Formulae
    Dai, Yifan
    Chen, Liangyu
    Zhang, Zihan
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 2578 - 2584
  • [24] Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy
    Zhao, Yuntao
    Ma, Deao
    Liu, Wei
    ENTROPY, 2024, 26 (08)
  • [25] A Tree-Based Contrast Set-Mining Approach to Detecting Group Differences
    Liu, Hongyan
    Yang, Yinghui
    Chen, Zhuohua
    Zheng, Yong
    INFORMS JOURNAL ON COMPUTING, 2014, 26 (02) : 208 - 221
  • [26] Video classification using a tree-based RBF network
    Gillespie, WJ
    Nguyen, DT
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 3753 - 3756
  • [27] Hierarchical Segmentation Using Tree-Based Shape Spaces
    Xu, Yongchao
    Carlinet, Edwin
    Eraud, Thierry G.
    Najman, Laurent
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017, 39 (03) : 457 - 469
  • [28] Tree-based disease classification using protein data
    Zhu, HT
    Yu, CY
    Zhang, HP
    PROTEOMICS, 2003, 3 (09) : 1673 - 1677
  • [29] Collision frequency analysis using tree-based stratification
    Park, YJ
    Saccomanno, FF
    STATISTICAL METHODS; HIGHWAY SAFETY DATA, ANALYSIS, AND EVALUATION; OCCUPANT PROTECTION; SYSTEMATIC REVIEWS AND META-ANALYSIS, 2005, (1908): : 121 - 129
  • [30] Travel Time Prediction Using Tree-Based Ensembles
    Huang, He
    Pouls, Martin
    Meyer, Anne
    Pauly, Markus
    COMPUTATIONAL LOGISTICS, ICCL 2020, 2020, 12433 : 412 - 427