Detecting Malicious Exploit Kits using Tree-based Similarity Searches

被引:20
|
作者
Taylor, Teryl [1 ]
Hu, Xin [2 ]
Wang, Ting [3 ]
Jang, Jiyong [2 ]
Stoecklin, Marc Ph. [2 ]
Monrose, Fabian [1 ]
Sailer, Reiner [2 ]
机构
[1] Univ North Carolina Chapel Hill, Chapel Hill, NC 27514 USA
[2] IBM TJ Watson Res Ctr, Armonk, NY 10504 USA
[3] Lehigh Univ, Bethlehem, PA USA
关键词
D O I
10.1145/2857705.2857718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malvertising, redirects browsers to web-based exploit kits that are designed to find vulnerabilities in the browser and subsequently download malicious payloads. We propose a new approach for detecting such malfeasance by leveraging the inherent structural patterns in HTTP traffic to classify exploit kit instances. Our key insight is that an exploit kit leads the browser to download payloads using multiple requests from malicious servers. We capture these interactions in a "tree-like" form, and using a scalable index of malware samples, model the detection process as a sub-tree similarity search problem. The approach is evaluated on 3800 hours of real-world traffic including over 4 billion flows and reduces false positive rates by four orders of magnitude over current state-of-the-art techniques with comparable true positive rates. We show that our approach can operate in near real-time, and is able to handle peak traffic levels on a large enterprise network-identifying 28 new exploit kit instances during our analysis period.
引用
收藏
页码:255 / 266
页数:12
相关论文
共 50 条
  • [41] Software Defect Prediction using Tree-Based Ensembles
    Aljamaan, Hamoud
    Alazba, Amal
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON PREDICTIVE MODELS AND DATA ANALYTICS IN SOFTWARE ENGINEERING, PROMISE 2020, 2020, : 1 - 10
  • [42] Fast SDN updates using tree-based architecture
    Hatami, Rashid
    Bahramgiri, Hossein
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 25 (03) : 333 - 346
  • [43] Hydrochemical analysis of groundwater using a tree-based model
    Litaor, M. Iggy
    Brielmann, H.
    Reichmann, O.
    Shenker, M.
    JOURNAL OF HYDROLOGY, 2010, 387 (3-4) : 273 - 282
  • [44] Predicting and interpreting financial distress using a weighted boosted tree-based tree
    Liu, Wanan
    Fan, Hong
    Xia, Min
    Pang, Congyuan
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 116
  • [45] Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS
    Aissou, Ghilas
    Slimane, Hadjar Ould
    Benouadah, Selma
    Kaabouch, Naima
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 649 - 653
  • [46] Detecting Exploit Websites Using Browser-based Predictive Analytics
    Almousa, May
    Anwar, Mohd
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 324 - 326
  • [47] Vibration Based Fault Monitoring of a Compressor using Tree-based Algorithms
    Prashanth, Kotha
    Elangovan, M.
    INTERNATIONAL CONFERENCE ON ADVANCES IN MATERIALS AND MANUFACTURING APPLICATIONS (ICONAMMA-2018), 2019, 577
  • [48] Tree-based text chat using XML-based messages
    Kim, K
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 669 - 675
  • [49] Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-based P2P Monitoring Systems
    Disterhoeft, Andreas
    Graffi, Kalman
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 52 - 60
  • [50] Lifetime Probability of Default using Survival Tree-Based Models
    Vieira Costa, Joao Paulo
    Portela, Cayan Atreio
    Kimura, Hebert
    Ladeira, Marcelo
    Diniz, Frederico Barros
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,