Detecting Malicious Landing Pages in Malware Distribution Networks

被引:0
|
作者
Wang, Gang [1 ]
Stokes, Jack W. [2 ]
Herley, Cormac [2 ]
Felstead, David [2 ]
机构
[1] Univ Calif Santa Barbara, Comp Sci, Santa Barbara, CA 93106 USA
[2] Microsoft Corp, Redmond, WA 98052 USA
关键词
Drive-by download; malware distribution network; signature;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Drive-by download attacks attempt to compromise a victim's computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, intermediate redirection servers, and exploit servers which attempt the compromise. In this paper, we present a novel approach to discovering the landing pages that lead to drive-by downloads. Starting from partial knowledge of a given collection of MDNs we identify the malicious content on their landing pages using multiclass feature selection. We then query the webpage cache of a commercial search engine to identify landing pages containing the same or similar content. In this way we are able to identify previously-unknown landing pages belonging to already identified MDNs, which allows us to expand our understanding of the MDN. We explore using both a rule-based and classifier approach to identifying potentially malicious landing pages. We build both systems and independently verify using a high-interaction honeypot that the newly identified landing pages indeed attempt drive-by downloads. For the rule-based system 57% of the landing pages predicted as malicious are confirmed, and this success rate remains constant in two large trials spaced five months apart. This extends the known footprint of the MDNs studied by 17%. The classifier-based system is less successful, and we explore possible reasons.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Malware Analysis: The Art of Detecting Malicious Activities
    El-moussa, Fadi
    Jones, Andy
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 51 - 59
  • [2] Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks
    Choi, Sang-Yong
    Lim, Chang Gyoon
    Kim, Yong-Min
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (01): : 100 - 115
  • [3] Nazca: Detecting Malware Distribution in Large-Scale Networks
    Invernizzi, Luca
    Miskovic, Stanislav
    Torres, Ruben
    Saha, Sabyasachi
    Lee, Sung-Ju
    Mellia, Marco
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [4] Malware and Formal Methods Rigorous Approaches for detecting Malicious Behaviour
    Martinelli, Fabio
    Mercaldo, Francesco
    Nardone, Vittoria
    Santone, Antonella
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [5] Hiding in Plain Sight: Characterizing and Detecting Malicious Facebook Pages
    Dewan, Prateek
    Bagroy, Shrey
    Kumaraguru, Ponnurangam
    [J]. PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 193 - 196
  • [6] Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
    Zhao, Guodong
    Xu, Ke
    Xu, Lei
    Wu, Bo
    [J]. IEEE ACCESS, 2015, 3 : 1132 - 1142
  • [7] Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques
    Chang, Ting-Yao
    Lai, Wei-Yu
    Hsiang, Tien-Ruey
    Mao, Ching-Hao
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 821 - 830
  • [8] The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy
    Liang, Shuang
    Ma, Yong
    Huang, Yanyu
    Guo, Jia
    Jia, Chunfu
    [J]. 2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 310 - 312
  • [9] BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
    Chiba, Daiki
    Yagi, Takeshi
    Akiyama, Mitsuaki
    Aoki, Kazufumi
    Hariu, Takeo
    Goto, Shigeki
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (05) : 1012 - 1023
  • [10] Anatomy on Malware Distribution Networks
    Kim, Sungjin
    [J]. IEEE ACCESS, 2020, 8 : 73919 - 73930