MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks

被引:4
|
作者
Takata, Yuta [1 ,2 ]
Akiyama, Mitsuaki [1 ]
Yagi, Takeshi [1 ]
Hariu, Takeo [1 ]
Goto, Shigeki [2 ]
机构
[1] NTT Corp, NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
[2] Waseda Univ, Tokyo 1698555, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2016年 / E99D卷 / 04期
关键词
drive-by download; web-based malware; code analysis; redirection analysis; CLIENT HONEYPOT;
D O I
10.1587/transinf.2015ICP0013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drive-by download attacks force users to automatically download and install malware by redirecting them to malicious URLs that exploit vulnerabilities of the user's web browser. In addition, several evasion techniques, such as code obfuscation and environment-dependent redirection, are used in combination with drive-by download attacks to prevent detection. In environment-dependent redirection, attackers profile the information on the user's environment, such as the name and version of the browser and browser plugins, and launch a drive-by download attack on only certain targets by changing the destination URL. When malicious content detection and collection techniques, such as honeyclients, are used that do not match the specific environment of the attack target, they cannot detect the attack because they are not redirected. Therefore, it is necessary to improve analysis coverage while countering these adversarial evasion techniques. We propose a method for exhaustively analyzing JavaScript code relevant to redirections and extracting the destination URLs in the code. Our method facilitates the detection of attacks by extracting a large number of URLs while controlling the analysis overhead by excluding code not relevant to redirections. We implemented our method in a browser emulator called MineSpider that automatically extracts potential URLs from websites. We validated it by using communication data with malicious websites captured during a three-year period. The experimental results demonstrated that MineSpider extracted 30,000 new URLs from malicious websites in a few seconds that conventional methods missed.
引用
收藏
页码:860 / 872
页数:13
相关论文
共 12 条
  • [2] MineSpider: Extracting URLs from Environment-dependent Drive-by Download Attacks
    Takata, Yuta
    Akiyama, Mitsuaki
    Yagi, Takeshi
    Hariu, Takeo
    Goto, Shigeki
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 444 - 449
  • [3] Prediction of drive-by download attacks on Twitter
    Javed, Amir
    Burnap, Pete
    Rana, Omer
    INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 1133 - 1145
  • [4] Drive-By Download Attacks A Comparative Study
    Sood, Aditya K.
    Zeadally, Sherali
    IT PROFESSIONAL, 2016, 18 (05) : 18 - 25
  • [5] Emotions Behind Drive-by Download Propagation on Twitter
    Javed, Amir
    Burnap, Pete
    Williams, Matthew L.
    Rana, Omer F.
    ACM TRANSACTIONS ON THE WEB, 2020, 14 (04)
  • [6] A Visual Approach to Detecting Drive-by Download Attacks
    Takada, Tetsuji
    Amako, Katsuhiro
    8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 162 - 163
  • [7] Efficient and effective realtime prediction of drive-by download attacks
    Jayasinghe, Gaya K.
    Culpepper, J. Shane
    Bertok, Peter
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 135 - 149
  • [8] Mitigating Drive-By Download Attacks: Challenges and Open Problems
    Egele, Manuel
    Kirda, Engin
    Kruegel, Christopher
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 52 - +
  • [9] Malicious File Hash Detection and Drive-by Download Attacks
    Ghafir, Ibrahim
    Prenosil, Vaclav
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 661 - 669
  • [10] Detection of Plug in Misuse Drive-By Download Attacks Using Kernel Machines
    Cherukuri, Manoj
    Mukkamala, Srinivas
    Shin, Dongwan
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 546 - 553