Hidden Path: Understanding the Intermediary in Malicious Redirections

被引:1
|
作者
Zeng, Yuwei [1 ,2 ]
Liu, Zhicheng [3 ]
Chen, Xunxun [3 ]
Zang, Tianning [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100045, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 101408, Peoples R China
[3] CNCERT CC, Beijing 100029, Peoples R China
关键词
Uniform resource locators; Navigation; Internet; Security; Relays; IP networks; Codes; Internet measurement; URL redirection; domain name;
D O I
10.1109/TIFS.2022.3169923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
URL redirection has become an important tool for adversaries to cover up their malicious campaigns. In this paper, we conduct the first large-scale measurement study on how adversaries leverage URL redirection to circumvent security checks and distribute malicious content in practice. To this end, we design an iteratively running framework to mine the domains used for malicious redirections constantly. First, we use a bipartite graph-based method to dig out the domains potentially involved in malicious redirections from real-world DNS traffic. Then, we dynamically crawl these suspicious domains and recover the corresponding redirection chains from the crawler's performance log. Based on the collected redirection chains, we analyze the working mechanism of various malicious redirections, involving the abused modes and methods, and highlight the pervasiveness of node sharing. Notably, we find a new redirection abuse, redirection fluxing, which is abused to enhance the concealment of malicious sites by introducing randomness into the redirection. Our case studies reveal the adversary's preference for abusing JavaScript methods to conduct redirection, even by introducing time-delay and fabricating user clicks to simulate normal users.
引用
收藏
页码:1725 / 1740
页数:16
相关论文
共 50 条
  • [31] Evolve Path Tracer: Early Detection of Malicious Addresses in Cryptocurrency
    Cheng, Ling
    Zhu, Feida
    Wang, Yong
    Liang, Ruicheng
    Liu, Huiwen
    [J]. PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 3889 - 3900
  • [32] Hidden Topological Angles in Path Integrals
    Behtash, Alireza
    Sulejmanpasic, Tin
    Schaefer, Thomas
    Uensal, Mithat
    [J]. PHYSICAL REVIEW LETTERS, 2015, 115 (04)
  • [33] Path of Research and Understanding
    Moreno Olmedo, Alejandro
    [J]. INTERACCION Y PERSPECTIVA, 2011, 1 (02): : 81 - 104
  • [34] On the Path to Mutual Understanding
    Davidson, Apollon
    Filatova, Irina
    [J]. ISTORIYA-ELEKTRONNYI NAUCHNO-OBRAZOVATELNYI ZHURNAL, 2023, 14
  • [35] The path from ethnic inequality to development: The intermediary role of institutional quality
    Berdiev, Aziz N.
    Goel, Rajeev K.
    Saunoris, James W.
    [J]. WORLD DEVELOPMENT, 2020, 130
  • [36] UNDERSTANDING USER-INTERMEDIARY DIALOGS FROM MULTIPLE PERSPECTIVES
    BELKIN, NJ
    [J]. PROCEEDINGS OF THE ASIS ANNUAL MEETING, 1991, 28 : 385 - 385
  • [37] New Insights on Intermediary Metabolism for a Better Understanding of Nutrition in Teleosts
    Panserat, S.
    Marandel, L.
    Seiliez, I.
    Skiba-Cassy, S.
    [J]. ANNUAL REVIEW OF ANIMAL BIOSCIENCES, VOL 7, 2019, 7 : 195 - 220
  • [38] Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery
    Wang, Chunmian
    Ling, Zhen
    Wu, Wenjia
    Chen, Qi
    Yang, Ming
    Fu, Xinwen
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1709 - 1718
  • [39] The paraveinal mesophyll: a specialized path for intermediary transfer of assimilates in legume leaves
    Lansing, AJ
    Franceschi, VR
    [J]. AUSTRALIAN JOURNAL OF PLANT PHYSIOLOGY, 2000, 27 (8-9): : 757 - 767
  • [40] Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models
    Salem, Aleieldin
    Schmidt, Tabea
    Pretschner, Alexander
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 108 - 115