Detecting and Preventing Drive-by Download Attack via Participative Monitoring of the Web

被引:2
|
作者
Matsunaka, Takashi [1 ]
Urakawa, Junpei [1 ]
Kubota, Ayumu [1 ]
机构
[1] KDDI R&D Labs Inc, Saitama, Japan
关键词
Drive-by download attack; Web link structure analysis;
D O I
10.1109/ASIAJCIS.2013.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Drive-by Download Attack (DBD) is one of the major threats on the web infrastructure. DBD attacks are triggered by user access to a malicious website and force users to download malware by exploiting the vulnerabilities of web browsers or plug-ins. Malicious websites are ephemeral. Therefore, it is necessary to gather fresh information related to malicious activities to detect and prevent such attacks. In this paper, we propose a framework that combats with DBD attacks with users' voluntary monitoring of the web. This framework tackles the two issues: ways to obtain up-to-date information related malicious activities and ways to provide up-to-date information to the world. The framework aims to realize a security ecosystem: users actively offer information about their activities on the web (e. g. access URL, download contents), and security analysts inspect the information to detect new threats and devise countermeasures for any new threats and then provide the countermeasures to users as feedback. The framework consists of sensors located on the user side and a centralized center located on the network side. Sensors are deployed in the web browser, in web proxies, and DNS servers. Sensors monitors the access URLs download contents, the method of triggering the link events (e. g. mouse click, move, redirected by the server), then the sensors report the data to the center. The center analyzes the data, derives the statistical data and the web link structure, and detects new threats by facilitating the characteristics of malicious web pages. This paper also shows a real world example that demonstrates the potential of our framework. The example implies that our focus on the change of the web link structure can detect illegal falsification of web pages. Our framework can obtain long-term data on how many hosts users are forced to access by the access of a web page, so we believe that our framework can distinguish legitimate changes in web pages with compromised changes.
引用
收藏
页码:48 / 55
页数:8
相关论文
共 5 条
  • [1] Automated Detection of Drive-by Download Attack
    Kikuchi, Hiroaki
    Matsumoto, Hiroaki
    Ishii, Hiroshi
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 511 - 515
  • [2] A Visual Approach to Detecting Drive-by Download Attacks
    Takada, Tetsuji
    Amako, Katsuhiro
    8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 162 - 163
  • [3] Similarity Analysis of Shellcodes in Drive-by Download Attack Kits
    Cherukuri, Manoj
    Mukkamala, Srinivas
    Shin, Dongwan
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 687 - 694
  • [4] An Approach to Detect Drive-by Download by Observing the Web Page Transition Behaviors
    Matsunaka, Takashi
    Kubota, Ayumu
    Kasama, Takahiro
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 19 - 25
  • [5] BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
    Lu, Long
    Yegneswaran, Vinod
    Porras, Phillip
    Lee, Wenke
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 440 - 450