Detecting Malicious Exploit Kits using Tree-based Similarity Searches

被引:20
|
作者
Taylor, Teryl [1 ]
Hu, Xin [2 ]
Wang, Ting [3 ]
Jang, Jiyong [2 ]
Stoecklin, Marc Ph. [2 ]
Monrose, Fabian [1 ]
Sailer, Reiner [2 ]
机构
[1] Univ North Carolina Chapel Hill, Chapel Hill, NC 27514 USA
[2] IBM TJ Watson Res Ctr, Armonk, NY 10504 USA
[3] Lehigh Univ, Bethlehem, PA USA
关键词
D O I
10.1145/2857705.2857718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malvertising, redirects browsers to web-based exploit kits that are designed to find vulnerabilities in the browser and subsequently download malicious payloads. We propose a new approach for detecting such malfeasance by leveraging the inherent structural patterns in HTTP traffic to classify exploit kit instances. Our key insight is that an exploit kit leads the browser to download payloads using multiple requests from malicious servers. We capture these interactions in a "tree-like" form, and using a scalable index of malware samples, model the detection process as a sub-tree similarity search problem. The approach is evaluated on 3800 hours of real-world traffic including over 4 billion flows and reduces false positive rates by four orders of magnitude over current state-of-the-art techniques with comparable true positive rates. We show that our approach can operate in near real-time, and is able to handle peak traffic levels on a large enterprise network-identifying 28 new exploit kit instances during our analysis period.
引用
收藏
页码:255 / 266
页数:12
相关论文
共 50 条
  • [31] ATM Allocation Using Decision Tree-Based Algorithms
    Yurdakul, Hazal Hasret
    Kasikci, Kerem
    Cagatay, Ilhan
    Guven, Melih
    Koras, Murat
    Akgun, Baris
    Gonen, Mehmet
    29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
  • [32] Using PhyloSuite for molecular phylogeny and tree-based analyses
    Xiang, Chuan-Yu
    Gao, Fangluan
    Jakovlic, Ivan
    Lei, Hong-Peng
    Hu, Ye
    Zhang, Hong
    Zou, Hong
    Wang, Gui-Tang
    Zhang, Dong
    IMETA, 2023, 2 (01):
  • [33] Exploiting Categorical Structure Using Tree-Based Methods
    Lucena, Brian
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 108, 2020, 108 : 2949 - 2957
  • [34] Predicting employee attrition using tree-based models
    El-Rayes, Nesreen
    Fang, Ming
    Smith, Michael
    Taylor, Stephen M.
    INTERNATIONAL JOURNAL OF ORGANIZATIONAL ANALYSIS, 2020, 28 (06) : 1273 - 1291
  • [35] What makes companies zombie? Detecting the most important zombification feature using tree-based machine learning
    Brahmana, Rayenda Khresna
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 270
  • [36] Unsupervised discretization using tree-based density estimation
    Schmidberger, G
    Frank, E
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2005, 2005, 3721 : 240 - 251
  • [37] Predicting Absenteeism at Work Using Tree-Based Learners
    Wahid, Zaman
    Satter, A. K. M. Zaidi
    Al Imran, Abdullah
    Bhuiyan, Touhid
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2019), 2019, : 7 - 11
  • [38] Estimation of sediment discharge using a tree-based model
    Jang, Eun-Kyung
    Ji, Un
    Yeo, Woonkwang
    HYDROLOGICAL SCIENCES JOURNAL, 2023, 68 (11) : 1513 - 1528
  • [39] Comparing Image Objects Using Tree-Based Approach
    Zielinski, Bartlomiej
    Iwanowski, Marcin
    COMPUTER VISION AND GRAPHICS, 2012, 7594 : 702 - 709
  • [40] Fast SDN updates using tree-based architecture
    Hatami R.
    Bahramgiri H.
    International Journal of Communication Networks and Distributed Systems, 2020, 25 (03): : 333 - 346