Hidden Path: Understanding the Intermediary in Malicious Redirections

被引:1
|
作者
Zeng, Yuwei [1 ,2 ]
Liu, Zhicheng [3 ]
Chen, Xunxun [3 ]
Zang, Tianning [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100045, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 101408, Peoples R China
[3] CNCERT CC, Beijing 100029, Peoples R China
关键词
Uniform resource locators; Navigation; Internet; Security; Relays; IP networks; Codes; Internet measurement; URL redirection; domain name;
D O I
10.1109/TIFS.2022.3169923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
URL redirection has become an important tool for adversaries to cover up their malicious campaigns. In this paper, we conduct the first large-scale measurement study on how adversaries leverage URL redirection to circumvent security checks and distribute malicious content in practice. To this end, we design an iteratively running framework to mine the domains used for malicious redirections constantly. First, we use a bipartite graph-based method to dig out the domains potentially involved in malicious redirections from real-world DNS traffic. Then, we dynamically crawl these suspicious domains and recover the corresponding redirection chains from the crawler's performance log. Based on the collected redirection chains, we analyze the working mechanism of various malicious redirections, involving the abused modes and methods, and highlight the pervasiveness of node sharing. Notably, we find a new redirection abuse, redirection fluxing, which is abused to enhance the concealment of malicious sites by introducing randomness into the redirection. Our case studies reveal the adversary's preference for abusing JavaScript methods to conduct redirection, even by introducing time-delay and fabricating user clicks to simulate normal users.
引用
收藏
页码:1725 / 1740
页数:16
相关论文
共 50 条
  • [1] Significant Factors for Detecting Malicious Redirections
    Hans, Kanchan
    Ahuja, Laxmi
    Muttoo, S. K.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 499 - 502
  • [2] REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic
    Burgess, Jonah
    Carlin, Domhnall
    O'Kane, Philip
    Sezer, Sakir
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [3] Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity
    Mekky, Hesham
    Torrest, Ruben
    Zhang, Zhi-Li
    Saha, Sabyasachi
    Nucci, Antonio
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1159 - 1167
  • [4] Advances and redirections in understanding effects of fetal drug exposure
    Singer, LT
    [J]. JOURNAL OF DRUG ISSUES, 1999, 29 (02) : 253 - 262
  • [5] Contemporary understanding of the intermediary services
    Dyma, O. O.
    [J]. MARKETING AND MANAGEMENT OF INNOVATIONS, 2014, (01): : 98 - 109
  • [6] Research on hidden malicious user detection problem
    Liu Tingting
    Shu Feng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 958 - 963
  • [7] Malicious Hypervisor and Hidden Virtualization of Operation Systems
    Sergeev, Anton
    Minchenkov, Victor
    Bashun, Vladimir
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 178 - 182
  • [8] Enzymology is basic to an understanding of intermediary metabolism
    Stadtman, ER
    [J]. BIOCHEMICAL AND BIOPHYSICAL RESEARCH COMMUNICATIONS, 2003, 312 (01) : 41 - 43
  • [9] Inducing Agents to Report Hidden Trades: A Theory of an Intermediary
    Leitner, Yaron
    [J]. REVIEW OF FINANCE, 2012, 16 (04) : 1013 - 1042
  • [10] The hidden career path
    Sparra, R
    [J]. POWER ENGINEERING, 2000, 104 (08) : 74 - +