REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic

被引:0
|
作者
Burgess, Jonah [1 ]
Carlin, Domhnall [1 ]
O'Kane, Philip [1 ]
Sezer, Sakir [1 ]
机构
[1] Queens Univ, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
关键词
Exploit Kits; Web Security; Malware; WEBSITES;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes REdiREKT, a system which utilises the open-source Zeek Intrusion Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks and extracts distinguishing features to assist machine learning (ML). We build a ground-truth dataset of EK samples, ensuring that the redirection chains for every sample are accurate and reusable in future experiments. By processing a unique combination of 9 redirection techniques, REdiREKT was able to correctly extract 96.52% of malicious domains from 1279 EK samples, spanning 28 families and 8 campaigns, and, only failed to extract 0.7% of malicious chains. Using the VirusTotal API to filter out domains flagged as malicious, we build a benign dataset from the Alexa top 10k websites, extracting 12,783 domains from 5910 redirection chains. The malicious redirection data is divided into yearly and family-based categories and compared to the benign results. Based on our analysis of the collected data, we extract and store 48 key features from websites within the redirection chains that could aid future ML-based detection efforts. Finally, we evaluate the performance of REdiREKT, compare it with existing research, and, suggest use-cases and future areas of work.
引用
收藏
页数:9
相关论文
共 46 条
  • [1] FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching
    Kim, Sungjin
    Kang, Brent ByungHoon
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 416 - 432
  • [2] Detecting Malicious Queries From Search Engine Traffic
    Pan, Daoxin
    Bai, Wei
    Zhang, Siyu
    Zou, Futai
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [3] Extracting Attack Narratives from Traffic Datasets
    Mireles, Jose David
    Cho, Jin-Hee
    Xu, Shouhuai
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 118 - 123
  • [4] A Foray Into Extracting Malicious Features from Executable Code with Neural Network Salience
    Santacroce, Michael
    Stegner, Wayne
    Koranek, Daniel
    Jha, Rashmi
    [J]. PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 185 - 191
  • [5] Learning Detector of Malicious Network Traffic from Weak Labels
    Franc, Vojtech
    Sofka, Michal
    Bartos, Karel
    [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III, 2015, 9286 : 85 - 99
  • [6] Extracting City Traffic Events from Social Streams
    Anantharam, Pramod
    Barnaghi, Payam
    Thirunarayan, Krishnaprasad
    Sheth, Amit
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2015, 6 (04)
  • [7] Extracting human behavior patterns from DNS traffic
    Panza, Martin
    Madariaga, Diego
    Bustos-Jimenez, Javier
    [J]. ANNALS OF TELECOMMUNICATIONS, 2022, 77 (5-6) : 407 - 420
  • [8] Extracting human behavior patterns from DNS traffic
    Martín Panza
    Diego Madariaga
    Javier Bustos-Jiménez
    [J]. Annals of Telecommunications, 2022, 77 : 407 - 420
  • [9] Design of a new rapid and efficient kit for extracting DNA from blood sample
    Jarallah, Shahad A.
    Zgeer, Dheaa Sh.
    Al-Fartusie, Falah S.
    [J]. EGYPTIAN JOURNAL OF CHEMISTRY, 2023, 66 (05): : 107 - 110
  • [10] Extracting Information From Sympathetic Nerve Traffic in Gestational Hypertension
    Walton, Sarah L.
    Denton, Kate M.
    [J]. HYPERTENSION, 2023, 80 (02) : 302 - 304